builder: autoland_xp_ix-debug_test-web-platform-tests-9
slave: t-xp32-ix-137
starttime: 1478642398.32
results: success (0)
buildid: 20161108115122
builduid: 24f33cf5e58e4709a51a62c17e6e95dc
revision: d0a3a42979e805db3b896ca786ed61ba85d9a6a7
========= Started set props: master (results: 0, elapsed: 0 secs) (at 2016-11-08 13:59:58.316448) =========
master: http://buildbot-master127.bb.releng.scl3.mozilla.com:8201/
========= Finished set props: master (results: 0, elapsed: 0 secs) (at 2016-11-08 13:59:58.316907) =========
========= Started downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-11-08 13:59:58.317195) =========
========= Finished downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-11-08 13:59:58.442035) =========
========= Started 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2016-11-08 13:59:58.442436) =========
'bash' '-c' 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-137\Application Data
CLIENTNAME=Console
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-137
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-137
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOGONSERVER=\\T-XP32-IX-137
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-137
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-137
WINDIR=C:\WINDOWS
using PTY: False
--13:59:58-- https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py
=> `archiver_client.py'
Resolving hg.mozilla.org... 63.245.215.102, 63.245.215.25
Connecting to hg.mozilla.org|63.245.215.102|:443... connected.
WARNING: Certificate verification error for hg.mozilla.org: certificate signature failure
HTTP request sent, awaiting response... 200 Script output follows
Length: 12,179 (12K) [text/x-python]
0K .......... . 100% 12.06 MB/s
13:59:59 (12.06 MB/s) - `archiver_client.py' saved [12179/12179]
program finished with exit code 0
elapsedTime=0.624000
========= master_lag: 0.07 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2016-11-08 13:59:59.135571) =========
========= Started 'rm -rf ...' (results: 0, elapsed: 1 secs) (at 2016-11-08 13:59:59.136088) =========
'rm' '-rf' 'scripts' 'properties'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['rm', '-rf', 'scripts', 'properties']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-137\Application Data
CLIENTNAME=Console
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-137
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-137
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOGONSERVER=\\T-XP32-IX-137
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-137
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-137
WINDIR=C:\WINDOWS
using PTY: False
program finished with exit code 0
elapsedTime=1.202000
========= master_lag: 0.02 =========
========= Finished 'rm -rf ...' (results: 0, elapsed: 1 secs) (at 2016-11-08 14:00:00.356491) =========
========= Started 'bash -c ...' (results: 0, elapsed: 2 secs) (at 2016-11-08 14:00:00.356858) =========
'bash' '-c' u'python archiver_client.py mozharness --repo integration/autoland --rev d0a3a42979e805db3b896ca786ed61ba85d9a6a7 --destination scripts --debug'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', u'python archiver_client.py mozharness --repo integration/autoland --rev d0a3a42979e805db3b896ca786ed61ba85d9a6a7 --destination scripts --debug']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-137\Application Data
CLIENTNAME=Console
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-137
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-137
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOGONSERVER=\\T-XP32-IX-137
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-137
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-137
WINDIR=C:\WINDOWS
using PTY: False
2016-11-08 14:00:00,885 truncating revision to first 12 chars
2016-11-08 14:00:00,885 Setting DEBUG logging.
2016-11-08 14:00:00,885 attempt 1/10
2016-11-08 14:00:00,885 Getting archive location from https://api.pub.build.mozilla.org/archiver/hgmo/integration/autoland/d0a3a42979e8?&preferred_region=us-west-2&suffix=tar.gz&subdir=testing/mozharness
2016-11-08 14:00:01,994 unpacking tar archive at: autoland-d0a3a42979e8/testing/mozharness/
2016-11-08 14:00:02,151 skipping symlink on windows: configs/single_locale/linux32.py
program finished with exit code 0
elapsedTime=2.109000
========= master_lag: 0.06 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 2 secs) (at 2016-11-08 14:00:02.530092) =========
========= Started set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-11-08 14:00:02.530402) =========
script_repo_revision: d0a3a42979e805db3b896ca786ed61ba85d9a6a7
========= Finished set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-11-08 14:00:02.530804) =========
========= Started downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-11-08 14:00:02.531073) =========
========= Finished downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-11-08 14:00:02.545685) =========
========= Started 'c:/mozilla-build/python27/python -u ...' (results: 0, elapsed: 1 hrs, 2 mins, 21 secs) (at 2016-11-08 14:00:02.546016) =========
'c:/mozilla-build/python27/python' '-u' 'scripts/scripts/web_platform_tests.py' '--cfg' 'web_platform_tests/prod_config_windows.py' '--test-type=testharness' '--total-chunks' '10' '--this-chunk' '9' '--blob-upload-branch' 'autoland' '--download-symbols' 'true'
in dir C:\slave\test\. (timeout 1800 secs) (maxTime 7200 secs)
watching logfiles {}
argv: ['c:/mozilla-build/python27/python', '-u', 'scripts/scripts/web_platform_tests.py', '--cfg', 'web_platform_tests/prod_config_windows.py', '--test-type=testharness', '--total-chunks', '10', '--this-chunk', '9', '--blob-upload-branch', 'autoland', '--download-symbols', 'true']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-137\Application Data
CLIENTNAME=Console
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-137
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
DevEnvDir=D:\msvs8\Common7\IDE
FP_NO_HOST_CHECK=NO
FrameworkDir=C:\WINDOWS\Microsoft.NET\Framework
FrameworkSDKDir=D:\msvs8\SDK\v2.0
FrameworkVersion=v2.0.50727
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-137
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LIBPATH=C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727;D:\msvs8\VC\ATLMFC\LIB
LOGONSERVER=\\T-XP32-IX-137
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
MOZILLABUILD=D:\mozilla-build
MOZILLABUILDDRIVE=C:
MOZILLABUILDPATH=\mozilla-build\
MOZ_AIRBAG=1
MOZ_CRASHREPORTER_NO_REPORT=1
MOZ_HIDE_RESULTS_TABLE=1
MOZ_MSVCVERSION=8
MOZ_NO_REMOTE=1
MOZ_TOOLS=D:\mozilla-build\moztools
MSVCDir=D:\msvs8\VC
NO_EM_RESTART=1
NO_FAIL_ON_TEST_ERRORS=1
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PROPERTIES_FILE=C:\slave\test/buildprops.json
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-137
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-137
VCINSTALLDIR=D:\msvs8\VC
VCVARS=D:\msvs8\VC\bin\vcvars32.bat
VSINSTALLDIR=D:\msvs8
WINDIR=C:\WINDOWS
XPCOM_DEBUG_BREAK=warn
using PTY: False
14:00:03 INFO - MultiFileLogger online at 20161108 14:00:03 in C:\slave\test
14:00:03 INFO - Run as scripts/scripts/web_platform_tests.py --cfg web_platform_tests/prod_config_windows.py --test-type=testharness --total-chunks 10 --this-chunk 9 --blob-upload-branch autoland --download-symbols true
14:00:03 INFO - Dumping config to C:\slave\test\logs\localconfig.json.
14:00:03 INFO - {'allow_software_gl_layers': False,
14:00:03 INFO - 'append_to_log': False,
14:00:03 INFO - 'base_work_dir': 'C:\\slave\\test',
14:00:03 INFO - 'blob_upload_branch': 'autoland',
14:00:03 INFO - 'blob_uploader_auth_file': 'C:\\slave\\test\\oauth.txt',
14:00:03 INFO - 'buildbot_json_path': 'buildprops.json',
14:00:03 INFO - 'config_files': ('web_platform_tests/prod_config_windows.py',),
14:00:03 INFO - 'default_blob_upload_servers': ('https://blobupload.elasticbeanstalk.com',),
14:00:03 INFO - 'download_minidump_stackwalk': True,
14:00:03 INFO - 'download_symbols': 'true',
14:00:03 INFO - 'e10s': False,
14:00:03 INFO - 'exes': {'hg': 'c:/mozilla-build/hg/hg',
14:00:03 INFO - 'mozinstall': ('C:\\slave\\test/build/venv/scripts/python',
14:00:03 INFO - 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py'),
14:00:03 INFO - 'python': 'c:\\mozilla-build\\python27\\python.exe',
14:00:03 INFO - 'tooltool.py': ('c:\\mozilla-build\\python27\\python.exe',
14:00:03 INFO - 'C:/mozilla-build/tooltool.py'),
14:00:03 INFO - 'virtualenv': ('c:\\mozilla-build\\python27\\python.exe',
14:00:03 INFO - 'c:/mozilla-build/buildbotve/virtualenv.py')},
14:00:03 INFO - 'find_links': ('http://pypi.pvt.build.mozilla.org/pub',
14:00:03 INFO - 'http://pypi.pub.build.mozilla.org/pub'),
14:00:03 INFO - 'log_level': 'info',
14:00:03 INFO - 'log_to_console': True,
14:00:03 INFO - 'opt_config_files': (),
14:00:03 INFO - 'options': ('--prefs-root=%(test_path)s/prefs',
14:00:03 INFO - '--processes=1',
14:00:03 INFO - '--config=%(test_path)s/wptrunner.ini',
14:00:03 INFO - '--ca-cert-path=%(test_path)s/certs/cacert.pem',
14:00:03 INFO - '--host-key-path=%(test_path)s/certs/web-platform.test.key',
14:00:03 INFO - '--host-cert-path=%(test_path)s/certs/web-platform.test.pem',
14:00:03 INFO - '--certutil-binary=%(test_install_path)s/bin/certutil'),
14:00:03 INFO - 'pip_index': False,
14:00:03 INFO - 'require_test_zip': True,
14:00:03 INFO - 'test_type': ('testharness',),
14:00:03 INFO - 'this_chunk': '9',
14:00:03 INFO - 'total_chunks': '10',
14:00:03 INFO - 'virtualenv_path': 'venv',
14:00:03 INFO - 'volatile_config': {'actions': None, 'add_actions': None, 'no_actions': None},
14:00:03 INFO - 'work_dir': 'build'}
14:00:03 INFO - [mozharness: 2016-11-08 22:00:03.276000Z] Running clobber step.
14:00:03 INFO - Running pre-action listener: _resource_record_pre_action
14:00:03 INFO - Running main action method: clobber
14:00:03 INFO - rmtree: C:\slave\test\build
14:00:03 INFO - Using _rmtree_windows ...
14:00:03 INFO - retry: Calling _rmtree_windows with args: ('C:\\slave\\test\\build',), kwargs: {}, attempt #1
14:00:41 INFO - Running post-action listener: _resource_record_post_action
14:00:41 INFO - [mozharness: 2016-11-08 22:00:41.458000Z] Finished clobber step (success)
14:00:41 INFO - [mozharness: 2016-11-08 22:00:41.458000Z] Running read-buildbot-config step.
14:00:41 INFO - Running pre-action listener: _resource_record_pre_action
14:00:41 INFO - Running main action method: read_buildbot_config
14:00:41 INFO - Using buildbot properties:
14:00:41 INFO - {
14:00:41 INFO - "project": "",
14:00:41 INFO - "product": "firefox",
14:00:41 INFO - "script_repo_revision": "production",
14:00:41 INFO - "scheduler": "tests-autoland-xp_ix-debug-unittest",
14:00:41 INFO - "repository": "",
14:00:41 INFO - "buildername": "Windows XP 32-bit autoland debug test web-platform-tests-9",
14:00:41 INFO - "buildid": "20161108115122",
14:00:41 INFO - "pgo_build": "False",
14:00:41 INFO - "basedir": "C:\\slave\\test",
14:00:41 INFO - "buildnumber": 293,
14:00:41 INFO - "slavename": "t-xp32-ix-137",
14:00:41 INFO - "revision": "d0a3a42979e805db3b896ca786ed61ba85d9a6a7",
14:00:41 INFO - "master": "http://buildbot-master127.bb.releng.scl3.mozilla.com:8201/",
14:00:41 INFO - "platform": "win32",
14:00:41 INFO - "branch": "autoland",
14:00:41 INFO - "repo_path": "integration/autoland",
14:00:41 INFO - "moz_repo_path": "",
14:00:41 INFO - "stage_platform": "win32",
14:00:41 INFO - "builduid": "24f33cf5e58e4709a51a62c17e6e95dc",
14:00:41 INFO - "slavebuilddir": "test"
14:00:41 INFO - }
14:00:41 INFO - Found a test packages url https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json.
14:00:41 INFO - Found installer url https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.zip.
14:00:41 INFO - Running post-action listener: _resource_record_post_action
14:00:41 INFO - [mozharness: 2016-11-08 22:00:41.473000Z] Finished read-buildbot-config step (success)
14:00:41 INFO - [mozharness: 2016-11-08 22:00:41.473000Z] Running download-and-extract step.
14:00:41 INFO - Running pre-action listener: _resource_record_pre_action
14:00:41 INFO - Running main action method: download_and_extract
14:00:41 INFO - mkdir: C:\slave\test\build\tests
14:00:41 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:00:41 INFO - trying https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json
14:00:41 INFO - Downloading https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json to C:\slave\test\build\firefox-52.0a1.en-US.win32.test_packages.json
14:00:41 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.test_packages.json'}, attempt #1
14:00:42 INFO - Downloaded 1274 bytes.
14:00:42 INFO - Reading from file C:\slave\test\build\firefox-52.0a1.en-US.win32.test_packages.json
14:00:42 INFO - Using the following test package requirements:
14:00:42 INFO - {u'common': [u'firefox-52.0a1.en-US.win32.common.tests.zip'],
14:00:42 INFO - u'cppunittest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.cppunittest.tests.zip'],
14:00:42 INFO - u'gtest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.gtest.tests.zip'],
14:00:42 INFO - u'jittest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'jsshell-win32.zip'],
14:00:42 INFO - u'mochitest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.mochitest.tests.zip'],
14:00:42 INFO - u'mozbase': [u'firefox-52.0a1.en-US.win32.common.tests.zip'],
14:00:42 INFO - u'reftest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.reftest.tests.zip'],
14:00:42 INFO - u'talos': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.talos.tests.zip'],
14:00:42 INFO - u'web-platform': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.web-platform.tests.zip'],
14:00:42 INFO - u'xpcshell': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
14:00:42 INFO - u'firefox-52.0a1.en-US.win32.xpcshell.tests.zip']}
14:00:42 INFO - Downloading packages: [u'firefox-52.0a1.en-US.win32.common.tests.zip', u'firefox-52.0a1.en-US.win32.web-platform.tests.zip'] for test suite category: web-platform
14:00:42 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip
14:00:42 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip'}, attempt #1
14:00:42 INFO - Fetch https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip into memory
14:00:42 INFO - Http code: 200
14:00:42 INFO - via: 1.1 37af14ee951b12568cf1cc160d08abe6.cloudfront.net (CloudFront)
14:00:42 INFO - x-amz-cf-id: CKqDXROU1phn1Or_xGuwoEP3k7KhCHM9XeZpp9xWMll3gzBJmbsDMA==
14:00:42 INFO - x-amz-version-id: CMWUq28hA9fX23._WjxZHdPAxZTls7Ep
14:00:43 INFO - Expected file size: 18686660
14:00:43 INFO - Obtained file size: 18686660
14:00:47 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip
14:00:47 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip'}, attempt #1
14:00:47 INFO - Fetch https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip into memory
14:00:48 INFO - Http code: 200
14:00:48 INFO - via: 1.1 49c80a47c1441dd194a8337982f1cd7e.cloudfront.net (CloudFront)
14:00:48 INFO - x-amz-cf-id: rvNgzoTsOt52FcW-31aFYyIDHcFrc61ArfaxOzSzku55P6pmgBUxuA==
14:00:48 INFO - x-amz-version-id: xm62d3Al5I6XTqpj9t7Oh_KtHxEUZBGH
14:00:50 INFO - Expected file size: 43221753
14:00:50 INFO - Obtained file size: 43221753
14:02:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:07 INFO - trying https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
14:02:07 INFO - Downloading https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.zip to C:\slave\test\build\firefox-52.0a1.en-US.win32.zip
14:02:07 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.zip', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.zip'}, attempt #1
14:02:12 INFO - Downloaded 66485709 bytes.
14:02:12 INFO - Setting buildbot property build_url to https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
14:02:12 INFO - mkdir: C:\slave\test\properties
14:02:12 INFO - Writing buildbot properties ['build_url'] to C:\slave\test\properties\build_url
14:02:12 INFO - Writing to file C:\slave\test\properties\build_url
14:02:12 INFO - Contents:
14:02:12 INFO - build_url:https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
14:02:12 INFO - retry: Calling query_symbols_url with args: (), kwargs: {}, attempt #1
14:02:13 INFO - Setting buildbot property symbols_url to https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
14:02:13 INFO - Writing buildbot properties ['symbols_url'] to C:\slave\test\properties\symbols_url
14:02:13 INFO - Writing to file C:\slave\test\properties\symbols_url
14:02:13 INFO - Contents:
14:02:13 INFO - symbols_url:https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
14:02:13 INFO - Downloading and extracting to C:\slave\test\build\symbols these dirs * from https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
14:02:13 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip'}, attempt #1
14:02:13 INFO - Fetch https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip into memory
14:02:13 INFO - Http code: 200
14:02:13 INFO - via: 1.1 93ab344e1a3fa44edbf3f1bc5729427a.cloudfront.net (CloudFront)
14:02:13 INFO - x-amz-cf-id: qUEaZQLdMSrfzchFp7bviC0aFzyvR4FRGw7ftaMBiWHcQwXv6cjqUg==
14:02:13 INFO - x-amz-version-id: ADYASXr1wMSzZg0xEmrfic5U_cSMeGI_
14:02:17 INFO - Expected file size: 66171449
14:02:17 INFO - Obtained file size: 66171449
14:02:32 INFO - Running post-action listener: _resource_record_post_action
14:02:32 INFO - Running post-action listener: set_extra_try_arguments
14:02:32 INFO - [mozharness: 2016-11-08 22:02:32.567000Z] Finished download-and-extract step (success)
14:02:32 INFO - [mozharness: 2016-11-08 22:02:32.567000Z] Running fetch-geckodriver step.
14:02:32 INFO - Running pre-action listener: _resource_record_pre_action
14:02:32 INFO - Running main action method: fetch_geckodriver
14:02:32 INFO - Running post-action listener: _resource_record_post_action
14:02:32 INFO - [mozharness: 2016-11-08 22:02:32.567000Z] Finished fetch-geckodriver step (success)
14:02:32 INFO - [mozharness: 2016-11-08 22:02:32.567000Z] Running create-virtualenv step.
14:02:32 INFO - Running pre-action listener: _pre_create_virtualenv
14:02:32 INFO - Running pre-action listener: _resource_record_pre_action
14:02:32 INFO - Running main action method: create_virtualenv
14:02:32 INFO - Creating virtualenv C:\slave\test\build\venv
14:02:32 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'c:/mozilla-build/buildbotve/virtualenv.py', '--no-site-packages', '--distribute', 'C:\\slave\\test\\build\\venv'] in C:\slave\test\build
14:02:32 INFO - Copy/paste: c:\mozilla-build\python27\python.exe c:/mozilla-build/buildbotve/virtualenv.py --no-site-packages --distribute C:\slave\test\build\venv
14:02:34 INFO - New python executable in C:\slave\test\build\venv\Scripts\python.exe
14:02:36 INFO - Installing distribute......................................................................................................................................................................................done.
14:02:37 INFO - Return code: 0
14:02:37 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', '--version']
14:02:37 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip --version
14:02:38 INFO - Reading from file tmpfile_stdout
14:02:38 INFO - Output received:
14:02:38 INFO - pip 0.8.2 from c:\slave\test\build\venv\lib\site-packages\pip-0.8.2-py2.7.egg (python 2.7)
14:02:38 INFO - Using _rmtree_windows ...
14:02:38 INFO - Using _rmtree_windows ...
14:02:38 INFO - Installing psutil>=3.1.1 into virtualenv C:\slave\test\build\venv
14:02:38 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:38 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:02:38 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:38 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:02:38 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:02:38 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1'] in C:\slave\test\build
14:02:38 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1
14:02:38 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:02:38 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:02:38 INFO - 'CLIENTNAME': 'Console',
14:02:38 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:02:38 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:02:38 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:02:38 INFO - 'DCLOCATION': 'SCL3',
14:02:38 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:02:38 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:02:38 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:02:38 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:02:38 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:02:38 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:02:38 INFO - 'HOMEDRIVE': 'C:',
14:02:38 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:38 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:02:38 INFO - 'KTS_VERSION': '1.19c',
14:02:38 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:02:38 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:02:38 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:02:38 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:02:38 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:02:38 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:02:38 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:02:38 INFO - 'MOZ_AIRBAG': '1',
14:02:38 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:02:38 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:02:38 INFO - 'MOZ_MSVCVERSION': '8',
14:02:38 INFO - 'MOZ_NO_REMOTE': '1',
14:02:38 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:02:38 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:02:38 INFO - 'NO_EM_RESTART': '1',
14:02:38 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:02:38 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:02:38 INFO - 'OS': 'Windows_NT',
14:02:38 INFO - 'OURDRIVE': 'C:',
14:02:38 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:02:38 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:02:38 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:02:38 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:02:38 INFO - 'PROCESSOR_LEVEL': '6',
14:02:38 INFO - 'PROCESSOR_REVISION': '1e05',
14:02:38 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:02:38 INFO - 'PROMPT': '$P$G',
14:02:38 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:02:38 INFO - 'PWD': 'C:\\slave\\test',
14:02:38 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:02:38 INFO - 'SESSIONNAME': 'Console',
14:02:38 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:02:38 INFO - 'SYSTEMDRIVE': 'C:',
14:02:38 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:02:38 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:38 INFO - 'TEST1': 'testie',
14:02:38 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:38 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:02:38 INFO - 'USERNAME': 'cltbld',
14:02:38 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:38 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:02:38 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:02:38 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:02:38 INFO - 'WINDIR': 'C:\\WINDOWS',
14:02:38 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:02:39 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:02:39 INFO - Downloading/unpacking psutil>=3.1.1
14:02:39 INFO - Running setup.py egg_info for package psutil
14:02:39 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
14:02:39 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects
...
14:02:39 INFO - Installing collected packages: psutil
14:02:39 INFO - Running setup.py install for psutil
14:02:39 INFO - building 'psutil._psutil_windows' extension
14:02:39 INFO - error: Unable to find vcvarsall.bat
14:02:39 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-n_hys3-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
14:02:39 INFO - running install
14:02:39 INFO - running build
14:02:39 INFO - running build_py
14:02:39 INFO - creating build
14:02:39 INFO - creating build\lib.win32-2.7
14:02:39 INFO - creating build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_common.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_compat.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_psbsd.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_pslinux.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_psosx.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_psposix.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_pssunos.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\_pswindows.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - copying psutil\__init__.py -> build\lib.win32-2.7\psutil
14:02:39 INFO - running build_ext
14:02:39 INFO - building 'psutil._psutil_windows' extension
14:02:39 INFO - error: Unable to find vcvarsall.bat
14:02:39 INFO - ----------------------------------------
14:02:39 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-n_hys3-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
14:02:39 INFO - Storing complete log in C:\Documents and Settings\cltbld.T-XP32-IX-137\Application Data\pip\pip.log
14:02:39 WARNING - Return code: 1
14:02:39 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 failed after 1 tries!
14:02:39 INFO - Installing mozsystemmonitor==0.3 into virtualenv C:\slave\test\build\venv
14:02:39 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:39 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:02:39 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:39 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:02:39 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:02:39 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3'] in C:\slave\test\build
14:02:39 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3
14:02:39 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:02:39 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:02:39 INFO - 'CLIENTNAME': 'Console',
14:02:39 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:02:39 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:02:39 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:02:39 INFO - 'DCLOCATION': 'SCL3',
14:02:39 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:02:39 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:02:39 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:02:39 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:02:39 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:02:39 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:02:39 INFO - 'HOMEDRIVE': 'C:',
14:02:39 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:39 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:02:39 INFO - 'KTS_VERSION': '1.19c',
14:02:39 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:02:39 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:02:39 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:02:39 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:02:39 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:02:39 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:02:39 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:02:39 INFO - 'MOZ_AIRBAG': '1',
14:02:39 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:02:39 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:02:39 INFO - 'MOZ_MSVCVERSION': '8',
14:02:39 INFO - 'MOZ_NO_REMOTE': '1',
14:02:39 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:02:39 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:02:39 INFO - 'NO_EM_RESTART': '1',
14:02:39 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:02:39 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:02:39 INFO - 'OS': 'Windows_NT',
14:02:39 INFO - 'OURDRIVE': 'C:',
14:02:39 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:02:39 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:02:39 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:02:39 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:02:39 INFO - 'PROCESSOR_LEVEL': '6',
14:02:39 INFO - 'PROCESSOR_REVISION': '1e05',
14:02:39 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:02:39 INFO - 'PROMPT': '$P$G',
14:02:39 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:02:39 INFO - 'PWD': 'C:\\slave\\test',
14:02:39 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:02:39 INFO - 'SESSIONNAME': 'Console',
14:02:39 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:02:39 INFO - 'SYSTEMDRIVE': 'C:',
14:02:39 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:02:39 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:39 INFO - 'TEST1': 'testie',
14:02:39 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:39 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:02:39 INFO - 'USERNAME': 'cltbld',
14:02:39 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:39 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:02:39 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:02:39 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:02:39 INFO - 'WINDIR': 'C:\\WINDOWS',
14:02:39 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:02:41 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:02:41 INFO - Downloading/unpacking mozsystemmonitor==0.3
14:02:41 INFO - Downloading mozsystemmonitor-0.3.tar.gz
14:02:41 INFO - Running setup.py egg_info for package mozsystemmonitor
14:02:41 INFO - Downloading/unpacking psutil>=3.1.1 (from mozsystemmonitor==0.3)
14:02:41 INFO - Running setup.py egg_info for package psutil
14:02:41 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
14:02:41 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ...
14:02:41 INFO - Installing collected packages: mozsystemmonitor, psutil
14:02:41 INFO - Running setup.py install for mozsystemmonitor
14:02:41 INFO - Running setup.py install for psutil
14:02:41 INFO - building 'psutil._psutil_windows' extension
14:02:41 INFO - error: Unable to find vcvarsall.bat
14:02:41 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-e6w2yz-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
14:02:41 INFO - running install
14:02:41 INFO - running build
14:02:41 INFO - running build_py
14:02:41 INFO - running build_ext
14:02:41 INFO - building 'psutil._psutil_windows' extension
14:02:41 INFO - error: Unable to find vcvarsall.bat
14:02:41 INFO - ----------------------------------------
14:02:41 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-e6w2yz-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
14:02:41 INFO - Storing complete log in C:\Documents and Settings\cltbld.T-XP32-IX-137\Application Data\pip\pip.log
14:02:41 WARNING - Return code: 1
14:02:41 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 failed after 1 tries!
14:02:41 INFO - Installing jsonschema==2.5.1 into virtualenv C:\slave\test\build\venv
14:02:41 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:41 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:02:41 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:41 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:02:41 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:02:41 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1'] in C:\slave\test\build
14:02:41 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub jsonschema==2.5.1
14:02:41 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:02:41 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:02:41 INFO - 'CLIENTNAME': 'Console',
14:02:41 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:02:41 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:02:41 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:02:41 INFO - 'DCLOCATION': 'SCL3',
14:02:41 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:02:41 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:02:41 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:02:41 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:02:41 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:02:41 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:02:41 INFO - 'HOMEDRIVE': 'C:',
14:02:41 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:41 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:02:41 INFO - 'KTS_VERSION': '1.19c',
14:02:41 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:02:41 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:02:41 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:02:41 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:02:41 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:02:41 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:02:41 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:02:41 INFO - 'MOZ_AIRBAG': '1',
14:02:41 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:02:41 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:02:41 INFO - 'MOZ_MSVCVERSION': '8',
14:02:41 INFO - 'MOZ_NO_REMOTE': '1',
14:02:41 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:02:41 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:02:41 INFO - 'NO_EM_RESTART': '1',
14:02:41 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:02:41 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:02:41 INFO - 'OS': 'Windows_NT',
14:02:41 INFO - 'OURDRIVE': 'C:',
14:02:41 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:02:41 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:02:41 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:02:41 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:02:41 INFO - 'PROCESSOR_LEVEL': '6',
14:02:41 INFO - 'PROCESSOR_REVISION': '1e05',
14:02:41 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:02:41 INFO - 'PROMPT': '$P$G',
14:02:41 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:02:41 INFO - 'PWD': 'C:\\slave\\test',
14:02:41 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:02:41 INFO - 'SESSIONNAME': 'Console',
14:02:41 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:02:41 INFO - 'SYSTEMDRIVE': 'C:',
14:02:41 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:02:41 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:41 INFO - 'TEST1': 'testie',
14:02:41 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:41 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:02:41 INFO - 'USERNAME': 'cltbld',
14:02:41 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:41 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:02:41 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:02:41 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:02:41 INFO - 'WINDIR': 'C:\\WINDOWS',
14:02:41 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:02:41 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:02:41 INFO - Downloading/unpacking jsonschema==2.5.1
14:02:43 INFO - Running setup.py egg_info for package jsonschema
14:02:43 INFO - zip_safe flag not set; analyzing archive contents...
14:02:43 INFO - install_dir .
14:02:43 INFO - Installed c:\slave\test\build\venv\build\jsonschema\vcversioner-2.16.0.0-py2.7.egg
14:02:43 INFO - Installing collected packages: jsonschema
14:02:43 INFO - Running setup.py install for jsonschema
14:02:43 INFO - Installing jsonschema-script.py script to C:\slave\test\build\venv\Scripts
14:02:43 INFO - Installing jsonschema.exe script to C:\slave\test\build\venv\Scripts
14:02:43 INFO - Successfully installed jsonschema
14:02:43 INFO - Cleaning up...
14:02:43 INFO - Return code: 0
14:02:43 INFO - Installing functools32==3.2.3-2 into virtualenv C:\slave\test\build\venv
14:02:43 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:43 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:02:43 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:43 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:02:43 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:02:43 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2'] in C:\slave\test\build
14:02:43 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub functools32==3.2.3-2
14:02:43 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:02:43 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:02:43 INFO - 'CLIENTNAME': 'Console',
14:02:43 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:02:43 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:02:43 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:02:43 INFO - 'DCLOCATION': 'SCL3',
14:02:43 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:02:43 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:02:43 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:02:43 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:02:43 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:02:43 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:02:43 INFO - 'HOMEDRIVE': 'C:',
14:02:43 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:43 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:02:43 INFO - 'KTS_VERSION': '1.19c',
14:02:43 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:02:43 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:02:43 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:02:43 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:02:43 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:02:43 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:02:43 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:02:43 INFO - 'MOZ_AIRBAG': '1',
14:02:43 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:02:43 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:02:43 INFO - 'MOZ_MSVCVERSION': '8',
14:02:43 INFO - 'MOZ_NO_REMOTE': '1',
14:02:43 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:02:43 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:02:43 INFO - 'NO_EM_RESTART': '1',
14:02:43 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:02:43 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:02:43 INFO - 'OS': 'Windows_NT',
14:02:43 INFO - 'OURDRIVE': 'C:',
14:02:43 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:02:43 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:02:43 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:02:43 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:02:43 INFO - 'PROCESSOR_LEVEL': '6',
14:02:43 INFO - 'PROCESSOR_REVISION': '1e05',
14:02:43 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:02:43 INFO - 'PROMPT': '$P$G',
14:02:43 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:02:43 INFO - 'PWD': 'C:\\slave\\test',
14:02:43 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:02:43 INFO - 'SESSIONNAME': 'Console',
14:02:43 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:02:43 INFO - 'SYSTEMDRIVE': 'C:',
14:02:43 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:02:43 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:43 INFO - 'TEST1': 'testie',
14:02:43 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:43 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:02:43 INFO - 'USERNAME': 'cltbld',
14:02:43 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:43 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:02:43 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:02:43 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:02:43 INFO - 'WINDIR': 'C:\\WINDOWS',
14:02:43 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:02:44 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:02:44 INFO - Downloading/unpacking functools32==3.2.3-2
14:02:44 INFO - Downloading functools32-3.2.3-2.tar.gz
14:02:44 INFO - Running setup.py egg_info for package functools32
14:02:44 INFO - warning: no files found matching '*.txt'
14:02:44 INFO - no previously-included directories found matching 'build'
14:02:44 INFO - no previously-included directories found matching 'dist'
14:02:44 INFO - no previously-included directories found matching '.git*'
14:02:44 INFO - Installing collected packages: functools32
14:02:44 INFO - Running setup.py install for functools32
14:02:44 INFO - warning: no files found matching '*.txt'
14:02:44 INFO - no previously-included directories found matching 'build'
14:02:44 INFO - no previously-included directories found matching 'dist'
14:02:44 INFO - no previously-included directories found matching '.git*'
14:02:44 INFO - Successfully installed functools32
14:02:44 INFO - Cleaning up...
14:02:44 INFO - Return code: 0
14:02:44 INFO - Installing blobuploader==1.2.4 into virtualenv C:\slave\test\build\venv
14:02:44 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:44 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:02:44 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:44 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:02:44 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:02:44 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4'] in C:\slave\test\build
14:02:44 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub blobuploader==1.2.4
14:02:44 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:02:44 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:02:44 INFO - 'CLIENTNAME': 'Console',
14:02:44 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:02:44 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:02:44 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:02:44 INFO - 'DCLOCATION': 'SCL3',
14:02:44 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:02:44 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:02:44 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:02:44 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:02:44 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:02:44 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:02:44 INFO - 'HOMEDRIVE': 'C:',
14:02:44 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:44 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:02:44 INFO - 'KTS_VERSION': '1.19c',
14:02:44 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:02:44 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:02:44 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:02:44 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:02:44 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:02:44 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:02:44 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:02:44 INFO - 'MOZ_AIRBAG': '1',
14:02:44 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:02:44 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:02:44 INFO - 'MOZ_MSVCVERSION': '8',
14:02:44 INFO - 'MOZ_NO_REMOTE': '1',
14:02:44 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:02:44 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:02:44 INFO - 'NO_EM_RESTART': '1',
14:02:44 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:02:44 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:02:44 INFO - 'OS': 'Windows_NT',
14:02:44 INFO - 'OURDRIVE': 'C:',
14:02:44 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:02:44 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:02:44 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:02:44 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:02:44 INFO - 'PROCESSOR_LEVEL': '6',
14:02:44 INFO - 'PROCESSOR_REVISION': '1e05',
14:02:44 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:02:44 INFO - 'PROMPT': '$P$G',
14:02:44 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:02:44 INFO - 'PWD': 'C:\\slave\\test',
14:02:44 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:02:44 INFO - 'SESSIONNAME': 'Console',
14:02:44 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:02:44 INFO - 'SYSTEMDRIVE': 'C:',
14:02:44 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:02:44 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:44 INFO - 'TEST1': 'testie',
14:02:44 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:44 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:02:44 INFO - 'USERNAME': 'cltbld',
14:02:44 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:44 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:02:44 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:02:44 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:02:44 INFO - 'WINDIR': 'C:\\WINDOWS',
14:02:44 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:02:45 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:02:45 INFO - Downloading/unpacking blobuploader==1.2.4
14:02:45 INFO - Downloading blobuploader-1.2.4.tar.gz
14:02:45 INFO - Running setup.py egg_info for package blobuploader
14:02:45 INFO - Downloading/unpacking requests==1.2.3. (from blobuploader==1.2.4)
14:02:48 INFO - Running setup.py egg_info for package requests
14:02:48 INFO - Downloading/unpacking docopt==0.6.1 (from blobuploader==1.2.4)
14:02:48 INFO - Downloading docopt-0.6.1.tar.gz
14:02:48 INFO - Running setup.py egg_info for package docopt
14:02:48 INFO - Installing collected packages: blobuploader, docopt, requests
14:02:48 INFO - Running setup.py install for blobuploader
14:02:48 INFO - Running setup.py install for docopt
14:02:48 INFO - Running setup.py install for requests
14:02:48 INFO - Successfully installed blobuploader docopt requests
14:02:48 INFO - Cleaning up...
14:02:48 INFO - Return code: 0
14:02:48 INFO - Installing None into virtualenv C:\slave\test\build\venv
14:02:48 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:48 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:02:48 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:02:48 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:02:48 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:02:48 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
14:02:48 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --no-deps --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
14:02:48 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:02:48 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:02:48 INFO - 'CLIENTNAME': 'Console',
14:02:48 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:02:48 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:02:48 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:02:48 INFO - 'DCLOCATION': 'SCL3',
14:02:48 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:02:48 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:02:48 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:02:48 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:02:48 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:02:48 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:02:48 INFO - 'HOMEDRIVE': 'C:',
14:02:48 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:48 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:02:48 INFO - 'KTS_VERSION': '1.19c',
14:02:48 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:02:48 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:02:48 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:02:48 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:02:48 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:02:48 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:02:48 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:02:48 INFO - 'MOZ_AIRBAG': '1',
14:02:48 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:02:48 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:02:48 INFO - 'MOZ_MSVCVERSION': '8',
14:02:48 INFO - 'MOZ_NO_REMOTE': '1',
14:02:48 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:02:48 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:02:48 INFO - 'NO_EM_RESTART': '1',
14:02:48 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:02:48 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:02:48 INFO - 'OS': 'Windows_NT',
14:02:48 INFO - 'OURDRIVE': 'C:',
14:02:48 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:02:48 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:02:48 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:02:48 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:02:48 INFO - 'PROCESSOR_LEVEL': '6',
14:02:48 INFO - 'PROCESSOR_REVISION': '1e05',
14:02:48 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:02:48 INFO - 'PROMPT': '$P$G',
14:02:48 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:02:48 INFO - 'PWD': 'C:\\slave\\test',
14:02:48 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:02:48 INFO - 'SESSIONNAME': 'Console',
14:02:48 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:02:48 INFO - 'SYSTEMDRIVE': 'C:',
14:02:48 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:02:48 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:48 INFO - 'TEST1': 'testie',
14:02:48 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:02:48 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:02:48 INFO - 'USERNAME': 'cltbld',
14:02:48 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:02:48 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:02:48 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:02:48 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:02:48 INFO - 'WINDIR': 'C:\\WINDOWS',
14:02:48 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:02:56 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
14:02:56 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
14:02:56 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
14:02:56 INFO - Unpacking c:\slave\test\build\tests\marionette\client
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
14:02:56 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
14:02:56 INFO - Unpacking c:\slave\test\build\tests\marionette
14:02:56 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
14:02:56 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
14:02:56 INFO - Installing collected packages: browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozfile, mozhttpd, mozinfo, mozInstall, mozleak, mozlog, moznetwork, mozprocess, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
14:02:56 INFO - Running setup.py install for browsermob-proxy
14:03:04 INFO - Running setup.py install for manifestparser
14:03:04 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for marionette-client
14:03:04 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
14:03:04 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for marionette-driver
14:03:04 INFO - Running setup.py install for mozcrash
14:03:04 INFO - Running setup.py install for mozdebug
14:03:04 INFO - Running setup.py install for mozdevice
14:03:04 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozfile
14:03:04 INFO - Running setup.py install for mozhttpd
14:03:04 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozinfo
14:03:04 INFO - Installing mozinfo-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozinfo.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozInstall
14:03:04 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozleak
14:03:04 INFO - Running setup.py install for mozlog
14:03:04 INFO - Installing structlog-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing structlog.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for moznetwork
14:03:04 INFO - Installing moznetwork-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing moznetwork.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozprocess
14:03:04 INFO - Running setup.py install for mozprofile
14:03:04 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozrunner
14:03:04 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for mozscreenshot
14:03:04 INFO - Running setup.py install for moztest
14:03:04 INFO - Running setup.py install for mozversion
14:03:04 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
14:03:04 INFO - Running setup.py install for wptserve
14:03:04 INFO - Successfully installed browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozfile mozhttpd mozinfo mozInstall mozleak mozlog moznetwork mozprocess mozprofile mozrunner mozscreenshot moztest mozversion wptserve
14:03:04 INFO - Cleaning up...
14:03:04 INFO - Return code: 0
14:03:04 INFO - Installing None into virtualenv C:\slave\test\build\venv
14:03:04 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:03:04 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
14:03:04 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:03:04 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
14:03:04 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00C25020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CF0038>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-137', 'USERDOMAIN': 'T-XP32-IX-137', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-137', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'CLIENTNAME': 'Console', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137'}}, attempt #1
14:03:04 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
14:03:04 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
14:03:04 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:03:04 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:03:04 INFO - 'CLIENTNAME': 'Console',
14:03:04 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:03:04 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:03:04 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:03:04 INFO - 'DCLOCATION': 'SCL3',
14:03:04 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:03:04 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:03:04 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:03:04 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:03:04 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:03:04 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:03:04 INFO - 'HOMEDRIVE': 'C:',
14:03:04 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:03:04 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:03:04 INFO - 'KTS_VERSION': '1.19c',
14:03:04 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:03:04 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:03:04 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:03:04 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:03:04 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:03:04 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:03:04 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:03:04 INFO - 'MOZ_AIRBAG': '1',
14:03:04 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:03:04 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:03:04 INFO - 'MOZ_MSVCVERSION': '8',
14:03:04 INFO - 'MOZ_NO_REMOTE': '1',
14:03:04 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:03:04 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:03:04 INFO - 'NO_EM_RESTART': '1',
14:03:04 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:03:04 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:03:04 INFO - 'OS': 'Windows_NT',
14:03:04 INFO - 'OURDRIVE': 'C:',
14:03:04 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:03:04 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:03:04 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:03:04 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:03:04 INFO - 'PROCESSOR_LEVEL': '6',
14:03:04 INFO - 'PROCESSOR_REVISION': '1e05',
14:03:04 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:03:04 INFO - 'PROMPT': '$P$G',
14:03:04 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:03:04 INFO - 'PWD': 'C:\\slave\\test',
14:03:04 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:03:04 INFO - 'SESSIONNAME': 'Console',
14:03:04 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:03:04 INFO - 'SYSTEMDRIVE': 'C:',
14:03:04 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:03:04 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:03:04 INFO - 'TEST1': 'testie',
14:03:04 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:03:04 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:03:04 INFO - 'USERNAME': 'cltbld',
14:03:04 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:03:04 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:03:04 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:03:04 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:03:04 INFO - 'WINDIR': 'C:\\WINDOWS',
14:03:04 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:03:09 INFO - Ignoring indexes: http://pypi.python.org/simple/
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
14:03:09 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
14:03:09 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
14:03:09 INFO - Unpacking c:\slave\test\build\tests\marionette\client
14:03:09 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
14:03:09 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
14:03:10 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
14:03:10 INFO - Unpacking c:\slave\test\build\tests\marionette
14:03:10 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
14:03:10 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
14:03:10 INFO - Requirement already satisfied (use --upgrade to upgrade): mozfile>=1.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
14:03:17 INFO - Requirement already satisfied (use --upgrade to upgrade): mozlog>=3.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
14:03:17 INFO - Requirement already satisfied (use --upgrade to upgrade): mozinfo in c:\slave\test\build\venv\lib\site-packages (from mozdebug->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 3))
14:03:17 INFO - Requirement already satisfied (use --upgrade to upgrade): moznetwork>=0.24 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
14:03:17 INFO - Requirement already satisfied (use --upgrade to upgrade): mozprocess>=0.19 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
14:03:17 INFO - Downloading/unpacking blessings>=1.3 (from mozlog->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 10))
14:03:17 INFO - Downloading blessings-1.6.tar.gz
14:03:17 INFO - Running setup.py egg_info for package blessings
14:03:17 INFO - Requirement already satisfied (use --upgrade to upgrade): requests>=1.1.0 in c:\slave\test\build\venv\lib\site-packages (from browsermob-proxy->-r C:\slave\test\build\tests\config\marionette_requirements.txt (line 4))
14:03:17 INFO - Installing collected packages: blessings, browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozhttpd, mozInstall, mozleak, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
14:03:17 INFO - Running setup.py install for blessings
14:03:17 INFO - Running setup.py install for browsermob-proxy
14:03:17 INFO - Running setup.py install for manifestparser
14:03:17 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Running setup.py install for marionette-client
14:03:17 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
14:03:17 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Running setup.py install for marionette-driver
14:03:17 INFO - Running setup.py install for mozcrash
14:03:17 INFO - Running setup.py install for mozdebug
14:03:17 INFO - Running setup.py install for mozdevice
14:03:17 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Running setup.py install for mozhttpd
14:03:17 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Running setup.py install for mozInstall
14:03:17 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Running setup.py install for mozleak
14:03:17 INFO - Running setup.py install for mozprofile
14:03:17 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Running setup.py install for mozrunner
14:03:17 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
14:03:17 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
14:03:19 INFO - Running setup.py install for mozscreenshot
14:03:19 INFO - Running setup.py install for moztest
14:03:19 INFO - Running setup.py install for mozversion
14:03:19 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
14:03:19 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
14:03:19 INFO - Running setup.py install for wptserve
14:03:19 INFO - Successfully installed blessings browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozhttpd mozInstall mozleak mozprofile mozrunner mozscreenshot moztest mozversion wptserve
14:03:19 INFO - Cleaning up...
14:03:19 INFO - Return code: 0
14:03:19 INFO - Done creating virtualenv C:\slave\test\build\venv.
14:03:19 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
14:03:19 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
14:03:19 INFO - Reading from file tmpfile_stdout
14:03:19 INFO - Using _rmtree_windows ...
14:03:19 INFO - Using _rmtree_windows ...
14:03:19 INFO - Current package versions:
14:03:19 INFO - blessings == 1.6
14:03:19 INFO - blobuploader == 1.2.4
14:03:19 INFO - browsermob-proxy == 0.6.0
14:03:19 INFO - distribute == 0.6.14
14:03:19 INFO - docopt == 0.6.1
14:03:19 INFO - functools32 == 3.2.3-2
14:03:19 INFO - jsonschema == 2.5.1
14:03:19 INFO - manifestparser == 1.1
14:03:19 INFO - marionette-client == 3.2.0
14:03:19 INFO - marionette-driver == 2.1.0
14:03:19 INFO - mozInstall == 1.12
14:03:19 INFO - mozcrash == 1.0
14:03:19 INFO - mozdebug == 0.1
14:03:19 INFO - mozdevice == 0.48
14:03:19 INFO - mozfile == 1.2
14:03:19 INFO - mozhttpd == 0.7
14:03:19 INFO - mozinfo == 0.9
14:03:19 INFO - mozleak == 0.1
14:03:19 INFO - mozlog == 3.4
14:03:19 INFO - moznetwork == 0.27
14:03:19 INFO - mozprocess == 0.23
14:03:19 INFO - mozprofile == 0.28
14:03:19 INFO - mozrunner == 6.13
14:03:19 INFO - mozscreenshot == 0.1
14:03:19 INFO - mozsystemmonitor == 0.3
14:03:19 INFO - moztest == 0.7
14:03:19 INFO - mozversion == 1.4
14:03:19 INFO - requests == 1.2.3
14:03:19 INFO - wptserve == 1.4.0
14:03:19 INFO - Running post-action listener: _resource_record_post_action
14:03:19 INFO - Running post-action listener: _start_resource_monitoring
14:03:19 INFO - Starting resource monitoring.
14:03:19 INFO - [mozharness: 2016-11-08 22:03:19.729000Z] Finished create-virtualenv step (success)
14:03:19 INFO - [mozharness: 2016-11-08 22:03:19.729000Z] Running pull step.
14:03:19 INFO - Running pre-action listener: _resource_record_pre_action
14:03:19 INFO - Running main action method: pull
14:03:19 INFO - Pull has nothing to do!
14:03:19 INFO - Running post-action listener: _resource_record_post_action
14:03:19 INFO - [mozharness: 2016-11-08 22:03:19.729000Z] Finished pull step (success)
14:03:19 INFO - [mozharness: 2016-11-08 22:03:19.729000Z] Running install step.
14:03:19 INFO - Running pre-action listener: _resource_record_pre_action
14:03:19 INFO - Running main action method: install
14:03:19 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
14:03:19 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
14:03:20 INFO - Reading from file tmpfile_stdout
14:03:20 INFO - Using _rmtree_windows ...
14:03:20 INFO - Using _rmtree_windows ...
14:03:20 INFO - Detecting whether we're running mozinstall >=1.0...
14:03:20 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', '-h']
14:03:20 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py -h
14:03:20 INFO - Reading from file tmpfile_stdout
14:03:20 INFO - Output received:
14:03:20 INFO - Usage: mozinstall-script.py [options] installer
14:03:20 INFO - Options:
14:03:20 INFO - -h, --help show this help message and exit
14:03:20 INFO - -d DEST, --destination=DEST
14:03:20 INFO - Directory to install application into. [default:
14:03:20 INFO - "C:\slave\test"]
14:03:20 INFO - --app=APP Application being installed. [default: firefox]
14:03:20 INFO - Using _rmtree_windows ...
14:03:20 INFO - Using _rmtree_windows ...
14:03:20 INFO - mkdir: C:\slave\test\build\application
14:03:20 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.zip', '--destination', 'C:\\slave\\test\\build\\application']
14:03:20 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py C:\slave\test\build\firefox-52.0a1.en-US.win32.zip --destination C:\slave\test\build\application
14:03:24 INFO - Reading from file tmpfile_stdout
14:03:24 INFO - Output received:
14:03:24 INFO - C:\slave\test\build\application\firefox\firefox.exe
14:03:24 INFO - Using _rmtree_windows ...
14:03:24 INFO - Using _rmtree_windows ...
14:03:24 INFO - Running post-action listener: _resource_record_post_action
14:03:24 INFO - [mozharness: 2016-11-08 22:03:24.727000Z] Finished install step (success)
14:03:24 INFO - [mozharness: 2016-11-08 22:03:24.727000Z] Running run-tests step.
14:03:24 INFO - Running pre-action listener: _resource_record_pre_action
14:03:24 INFO - Running main action method: run_tests
14:03:24 INFO - mkdir: C:\slave\test\build\blobber_upload_dir
14:03:24 INFO - Minidump filename unknown. Determining based upon platform and architecture.
14:03:24 INFO - Minidump tooltool manifest unknown. Determining based upon platform and architecture.
14:03:24 INFO - grabbing minidump binary from tooltool
14:03:24 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
14:03:24 INFO - retry: Calling run_command with args: (['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'],), kwargs: {'output_timeout': 600, 'error_list': [{'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C15480>, 'level': 'critical'}, {'substr': 'ERROR - ', 'level': 'error'}], 'cwd': 'C:\\slave\\test\\build', 'privileged': False}, attempt #1
14:03:24 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] in C:\slave\test\build
14:03:24 INFO - Copy/paste: c:\mozilla-build\python27\python.exe C:/mozilla-build/tooltool.py --url https://api.pub.build.mozilla.org/tooltool/ --authentication-file c:\builds\relengapi.tok fetch -m C:\slave\test\build\tests\config/tooltool-manifests/win32/releng.manifest -o
14:03:24 INFO - Calling ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] with output_timeout 600
14:03:24 INFO - INFO - Attempting to fetch from 'https://api.pub.build.mozilla.org/tooltool/'...
14:03:27 INFO - INFO - File win32-minidump_stackwalk.exe fetched from https://api.pub.build.mozilla.org/tooltool/ as C:\slave\test\build\tmppympi4
14:03:27 INFO - INFO - File integrity verified, renaming tmppympi4 to win32-minidump_stackwalk.exe
14:03:27 INFO - Return code: 0
14:03:27 INFO - Chmoding C:\slave\test\build\win32-minidump_stackwalk.exe to 0755
14:03:27 INFO - ENV: MINIDUMP_SAVE_PATH is now C:\slave\test\build\blobber_upload_dir
14:03:27 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] in C:\slave\test\build
14:03:27 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\python -u C:\slave\test\build\tests\web-platform\runtests.py --log-raw=- --log-raw=C:\slave\test\build\blobber_upload_dir\wpt_raw.log --log-errorsummary=C:\slave\test\build\blobber_upload_dir\wpt_errorsummary.log --binary=C:\slave\test\build\application\firefox\firefox.exe --symbols-path=https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip --stackwalk-binary=C:\slave\test\build\win32-minidump_stackwalk.exe --stackfix-dir=C:\slave\test\build\tests\bin --test-type=testharness --disable-e10s --total-chunks=10 --this-chunk=9 --prefs-root=C:\slave\test\build\tests\web-platform/prefs --processes=1 --config=C:\slave\test\build\tests\web-platform/wptrunner.ini --ca-cert-path=C:\slave\test\build\tests\web-platform/certs/cacert.pem --host-key-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.key --host-cert-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.pem --certutil-binary=C:\slave\test\build\tests/bin/certutil
14:03:28 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
14:03:28 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137\\Application Data',
14:03:28 INFO - 'CLIENTNAME': 'Console',
14:03:28 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
14:03:28 INFO - 'COMPUTERNAME': 'T-XP32-IX-137',
14:03:28 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
14:03:28 INFO - 'DCLOCATION': 'SCL3',
14:03:28 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
14:03:28 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
14:03:28 INFO - 'FP_NO_HOST_CHECK': 'NO',
14:03:28 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
14:03:28 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
14:03:28 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
14:03:28 INFO - 'HOMEDRIVE': 'C:',
14:03:28 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:03:28 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
14:03:28 INFO - 'KTS_VERSION': '1.19c',
14:03:28 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
14:03:28 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-137',
14:03:28 INFO - 'MINIDUMP_SAVE_PATH': 'C:\\slave\\test\\build\\blobber_upload_dir',
14:03:28 INFO - 'MONDIR': 'C:\\Monitor_config\\',
14:03:28 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
14:03:28 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
14:03:28 INFO - 'MOZILLABUILDDRIVE': 'C:',
14:03:28 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
14:03:28 INFO - 'MOZ_AIRBAG': '1',
14:03:28 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
14:03:28 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
14:03:28 INFO - 'MOZ_MSVCVERSION': '8',
14:03:28 INFO - 'MOZ_NO_REMOTE': '1',
14:03:28 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
14:03:28 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
14:03:28 INFO - 'NO_EM_RESTART': '1',
14:03:28 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
14:03:28 INFO - 'NUMBER_OF_PROCESSORS': '8',
14:03:28 INFO - 'OS': 'Windows_NT',
14:03:28 INFO - 'OURDRIVE': 'C:',
14:03:28 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
14:03:28 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
14:03:28 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
14:03:28 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
14:03:28 INFO - 'PROCESSOR_LEVEL': '6',
14:03:28 INFO - 'PROCESSOR_REVISION': '1e05',
14:03:28 INFO - 'PROGRAMFILES': 'C:\\Program Files',
14:03:28 INFO - 'PROMPT': '$P$G',
14:03:28 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
14:03:28 INFO - 'PWD': 'C:\\slave\\test',
14:03:28 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
14:03:28 INFO - 'SESSIONNAME': 'Console',
14:03:28 INFO - 'SLAVEDIR': 'C:\\slave\\',
14:03:28 INFO - 'SYSTEMDRIVE': 'C:',
14:03:28 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
14:03:28 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:03:28 INFO - 'TEST1': 'testie',
14:03:28 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
14:03:28 INFO - 'USERDOMAIN': 'T-XP32-IX-137',
14:03:28 INFO - 'USERNAME': 'cltbld',
14:03:28 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-137',
14:03:28 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
14:03:28 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
14:03:28 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
14:03:28 INFO - 'WINDIR': 'C:\\WINDOWS',
14:03:28 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
14:03:28 INFO - Calling ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/RH2RFwVRSI6dHueXueT2lw/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] with output_timeout 1000
14:03:29 INFO - STDERR: C:\slave\test\build\venv\lib\site-packages\mozrunner\utils.py:18: UserWarning: Module wptserve was already imported from C:\slave\test\build\tests\web-platform\tests\tools\wptserve\wptserve\__init__.py, but c:\slave\test\build\venv\lib\site-packages is being added to sys.path
14:03:29 INFO - import pkg_resources
14:03:29 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\meta\MANIFEST.json
14:03:30 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\mozilla\meta\MANIFEST.json
14:03:36 INFO - Using 1 client processes
14:03:39 INFO - SUITE-START | Running 829 tests
14:03:39 INFO - Running testharness tests
14:03:39 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker
14:03:39 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker | took 0ms
14:03:39 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html
14:03:39 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html | took 0ms
14:03:39 INFO - TEST-START | /XMLHttpRequest/send-redirect-post-upload.htm
14:03:39 INFO - TEST-SKIP | /XMLHttpRequest/send-redirect-post-upload.htm | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html | took 0ms
14:03:39 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html
14:03:39 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html | took 0ms
14:03:39 INFO - TEST-START | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html
14:03:39 INFO - TEST-SKIP | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html | took 0ms
14:03:39 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html
14:03:39 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html | took 0ms
14:03:39 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html
14:03:39 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html | took 0ms
14:03:39 INFO - TEST-START | /html/semantics/embedded-content/media-elements/video_loop_base.html
14:03:39 INFO - TEST-SKIP | /html/semantics/embedded-content/media-elements/video_loop_base.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/area-navigate.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/area-navigate.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/fetch-messaging.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/fetch-messaging.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/iframe-messaging.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/iframe-messaging.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/image-decoding.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/image-decoding.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/link-navigate.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/link-navigate.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/script-messaging.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/script-messaging.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/worker-messaging.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/worker-messaging.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/generic/subresource-test/xhr-messaging.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/xhr-messaging.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html | took 0ms
14:03:39 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
14:03:39 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html | took 0ms
14:03:39 INFO - TEST-START | /service-workers/service-worker/appcache-ordering-main.https.html
14:03:39 INFO - TEST-SKIP | /service-workers/service-worker/appcache-ordering-main.https.html | took 0ms
14:03:39 INFO - TEST-START | /service-workers/service-worker/resource-timing.https.html
14:03:39 INFO - TEST-SKIP | /service-workers/service-worker/resource-timing.https.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html | took 15ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html | took 0ms
14:03:39 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html
14:03:39 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html?wss
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html?wss | took 0ms
14:03:39 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html
14:03:39 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html | took 0ms
14:03:40 INFO - Setting up ssl
14:03:40 INFO - PROCESS | certutil |
14:03:41 INFO - PROCESS | certutil |
14:03:41 INFO - PROCESS | certutil |
14:03:41 INFO - Certificate Nickname Trust Attributes
14:03:41 INFO - SSL,S/MIME,JAR/XPI
14:03:41 INFO -
14:03:41 INFO - web-platform-tests CT,,
14:03:41 INFO -
14:03:41 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\docume~1\cltbld~1.t-x\locals~1\temp\tmpsmvx6q.mozrunner
14:03:41 INFO - Starting runner
14:03:42 INFO - PROCESS | 4012 | [4012] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/startupcache/StartupCache.cpp, line 219
14:03:43 INFO - PROCESS | 4012 | [4012] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
14:03:43 INFO - PROCESS | 4012 | [4012] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
14:03:45 INFO - PROCESS | 4012 | 1478642625115 Marionette DEBUG Marionette enabled via build flag and pref
14:03:45 INFO - PROCESS | 4012 | ++DOCSHELL 12E0C000 == 1 [pid = 4012] [id = 1]
14:03:45 INFO - PROCESS | 4012 | ++DOMWINDOW == 1 (12E0C400) [pid = 4012] [serial = 1] [outer = 00000000]
14:03:45 INFO - PROCESS | 4012 | ++DOMWINDOW == 2 (12E0D000) [pid = 4012] [serial = 2] [outer = 12E0C400]
14:03:45 INFO - PROCESS | 4012 | [4012] WARNING: Dwm composition not available, falling back to software vsync: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 2011
14:03:45 INFO - PROCESS | 4012 | [4012] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/io/nsDirectoryService.cpp, line 500
14:03:45 INFO - PROCESS | 4012 | [4012] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 794
14:03:45 INFO - PROCESS | 4012 | [4012] WARNING: Failed to determine sandbox temp dir path.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 867
14:03:45 INFO - PROCESS | 4012 | ++DOCSHELL 132A6000 == 2 [pid = 4012] [id = 2]
14:03:45 INFO - PROCESS | 4012 | ++DOMWINDOW == 3 (132A6400) [pid = 4012] [serial = 3] [outer = 00000000]
14:03:45 INFO - PROCESS | 4012 | ++DOMWINDOW == 4 (132A7000) [pid = 4012] [serial = 4] [outer = 132A6400]
14:03:45 INFO - PROCESS | 4012 | 1478642625962 Marionette INFO Listening on port 2828
14:03:46 INFO - PROCESS | 4012 | 1478642626900 Marionette DEBUG Marionette enabled via command-line flag
14:03:46 INFO - PROCESS | 4012 | ++DOCSHELL 147E3C00 == 3 [pid = 4012] [id = 3]
14:03:46 INFO - PROCESS | 4012 | ++DOMWINDOW == 5 (147E4000) [pid = 4012] [serial = 5] [outer = 00000000]
14:03:46 INFO - PROCESS | 4012 | ++DOMWINDOW == 6 (147E4C00) [pid = 4012] [serial = 6] [outer = 147E4000]
14:03:47 INFO - PROCESS | 4012 | ++DOMWINDOW == 7 (147B8C00) [pid = 4012] [serial = 7] [outer = 132A6400]
14:03:47 INFO - PROCESS | 4012 | 1478642627256 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:1783
14:03:47 INFO - PROCESS | 4012 | 1478642627275 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:1784
14:03:47 INFO - PROCESS | 4012 | 1478642627312 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:1785
14:03:47 INFO - PROCESS | 4012 | 1478642627315 Marionette DEBUG Closed connection conn0
14:03:47 INFO - PROCESS | 4012 | 1478642627317 Marionette DEBUG Closed connection conn1
14:03:47 INFO - PROCESS | 4012 | 1478642627407 Marionette DEBUG Closed connection conn2
14:03:47 INFO - PROCESS | 4012 | 1478642627414 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:1786
14:03:47 INFO - PROCESS | 4012 | 1478642627459 Marionette DEBUG Closed connection conn3
14:03:47 INFO - PROCESS | 4012 | 1478642627465 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:1787
14:03:47 INFO - PROCESS | 4012 | ++DOCSHELL 12E0D400 == 4 [pid = 4012] [id = 4]
14:03:47 INFO - PROCESS | 4012 | ++DOMWINDOW == 8 (1545DC00) [pid = 4012] [serial = 8] [outer = 00000000]
14:03:47 INFO - PROCESS | 4012 | ++DOMWINDOW == 9 (1590AC00) [pid = 4012] [serial = 9] [outer = 1545DC00]
14:03:47 INFO - PROCESS | 4012 | ++DOMWINDOW == 10 (15A64C00) [pid = 4012] [serial = 10] [outer = 1545DC00]
14:03:47 INFO - PROCESS | 4012 | 1478642627748 Marionette TRACE conn4 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
14:03:47 INFO - PROCESS | 4012 | 1478642627754 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161108115122","processId":4012,"version":"52.0a1"}
14:03:48 INFO - PROCESS | 4012 | [4012] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
14:03:48 INFO - PROCESS | 4012 | [4012] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
14:03:48 INFO - PROCESS | 4012 | [4012] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
14:03:48 INFO - PROCESS | 4012 | [4012] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
14:03:48 INFO - PROCESS | 4012 | [4012] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:03:48 INFO - PROCESS | 4012 | ++DOCSHELL 17725C00 == 5 [pid = 4012] [id = 5]
14:03:48 INFO - PROCESS | 4012 | ++DOMWINDOW == 11 (17729400) [pid = 4012] [serial = 11] [outer = 00000000]
14:03:48 INFO - PROCESS | 4012 | ++DOCSHELL 1772A000 == 6 [pid = 4012] [id = 6]
14:03:48 INFO - PROCESS | 4012 | ++DOMWINDOW == 12 (1772A400) [pid = 4012] [serial = 12] [outer = 00000000]
14:03:49 INFO - PROCESS | 4012 | ++DOCSHELL 189A7400 == 7 [pid = 4012] [id = 7]
14:03:49 INFO - PROCESS | 4012 | ++DOMWINDOW == 13 (189A7800) [pid = 4012] [serial = 13] [outer = 00000000]
14:03:49 INFO - PROCESS | 4012 | ++DOMWINDOW == 14 (18C80400) [pid = 4012] [serial = 14] [outer = 189A7800]
14:03:49 INFO - PROCESS | 4012 | ++DOMWINDOW == 15 (19047C00) [pid = 4012] [serial = 15] [outer = 17729400]
14:03:49 INFO - PROCESS | 4012 | ++DOMWINDOW == 16 (19048C00) [pid = 4012] [serial = 16] [outer = 1772A400]
14:03:49 INFO - PROCESS | 4012 | ++DOMWINDOW == 17 (1904A400) [pid = 4012] [serial = 17] [outer = 189A7800]
14:03:50 INFO - PROCESS | 4012 | 1478642630312 Marionette DEBUG loaded listener.js
14:03:51 INFO - PROCESS | 4012 | ++DOMWINDOW == 18 (19F15000) [pid = 4012] [serial = 18] [outer = 189A7800]
14:03:51 INFO - PROCESS | 4012 | 1478642631156 Marionette TRACE conn4 <- [1,1,null,{"sessionId":"9f0517c1-1bb1-418e-8c11-92eb2d9ded31","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161108115122","processId":4012,"version":"52.0a1","command_id":1}}]
14:03:51 INFO - PROCESS | 4012 | 1478642631308 Marionette TRACE conn4 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
14:03:51 INFO - PROCESS | 4012 | 1478642631369 Marionette TRACE conn4 <- [1,2,null,{"value":null}]
14:03:51 INFO - PROCESS | 4012 | 1478642631441 Marionette TRACE conn4 -> [0,3,"getWindowHandle",null]
14:03:51 INFO - PROCESS | 4012 | 1478642631446 Marionette TRACE conn4 <- [1,3,null,{"value":"13"}]
14:03:51 INFO - PROCESS | 4012 | 1478642631546 Marionette TRACE conn4 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
14:03:51 INFO - PROCESS | 4012 | [4012] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
14:03:51 INFO - PROCESS | 4012 | ++DOMWINDOW == 19 (1AD9D000) [pid = 4012] [serial = 19] [outer = 189A7800]
14:03:52 INFO - PROCESS | 4012 | 1478642632285 Marionette TRACE conn4 <- [1,4,null,{}]
14:03:52 INFO - PROCESS | 4012 | 1478642632380 Marionette TRACE conn4 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
14:03:52 INFO - PROCESS | 4012 | 1478642632408 Marionette TRACE conn4 <- [1,5,null,{"value":null}]
14:03:52 INFO - PROCESS | 4012 | 1478642632438 Marionette TRACE conn4 -> [0,6,"getWindowHandle",null]
14:03:52 INFO - PROCESS | 4012 | 1478642632443 Marionette TRACE conn4 <- [1,6,null,{"value":"13"}]
14:03:52 INFO - TEST-START | /2dcontext/image-smoothing/imagesmoothing.html
14:03:52 INFO - PROCESS | 4012 | 1478642632456 Marionette TRACE conn4 -> [0,7,"timeouts",{"script":35000}]
14:03:52 INFO - PROCESS | 4012 | 1478642632460 Marionette TRACE conn4 <- [1,7,null,{}]
14:03:52 INFO - PROCESS | 4012 | 1478642632509 Marionette TRACE conn4 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:03:52 INFO - PROCESS | 4012 | 1478642632535 Marionette TRACE conn4 <- [1,8,null,{"value":null}]
14:03:52 INFO - PROCESS | 4012 | 1478642632544 Marionette TRACE conn4 -> [0,9,"getWindowHandles",null]
14:03:52 INFO - PROCESS | 4012 | 1478642632547 Marionette TRACE conn4 <- [1,9,null,["13"]]
14:03:52 INFO - PROCESS | 4012 | 1478642632560 Marionette TRACE conn4 -> [0,10,"switchToWindow",{"name":"13"}]
14:03:52 INFO - PROCESS | 4012 | 1478642632564 Marionette TRACE conn4 <- [1,10,null,{}]
14:03:52 INFO - PROCESS | 4012 | 1478642632579 Marionette TRACE conn4 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/2dcontext/image-smoothing/imagesmoothing.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:03:52 INFO - PROCESS | 4012 | ++DOCSHELL 1B2BB400 == 8 [pid = 4012] [id = 8]
14:03:52 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (1B2BB800) [pid = 4012] [serial = 20] [outer = 00000000]
14:03:52 INFO - PROCESS | 4012 | ++DOMWINDOW == 21 (1B2BEC00) [pid = 4012] [serial = 21] [outer = 1B2BB800]
14:03:52 INFO - PROCESS | 4012 | 1478642632659 Marionette DEBUG loaded listener.js
14:03:52 INFO - PROCESS | 4012 | ++DOMWINDOW == 22 (1B2C2C00) [pid = 4012] [serial = 22] [outer = 1B2BB800]
14:03:52 INFO - PROCESS | 4012 | ++DOCSHELL 1B4AA400 == 9 [pid = 4012] [id = 9]
14:03:52 INFO - PROCESS | 4012 | ++DOMWINDOW == 23 (1B4AB800) [pid = 4012] [serial = 23] [outer = 00000000]
14:03:52 INFO - PROCESS | 4012 | ++DOMWINDOW == 24 (1B617C00) [pid = 4012] [serial = 24] [outer = 1B4AB800]
14:03:52 INFO - PROCESS | 4012 | 1478642632982 Marionette DEBUG loaded listener.js
14:03:53 INFO - PROCESS | 4012 | ++DOMWINDOW == 25 (1B619400) [pid = 4012] [serial = 25] [outer = 1B4AB800]
14:03:53 INFO - PROCESS | 4012 | 1478642633272 Marionette TRACE conn4 <- [1,11,null,{"value":["/2dcontext/image-smoothing/imagesmoothing.html",0,null,null,[["When the canvas context is created, imageSmoothingEnabled must be set to true.",0,null,null],["On getting imageSmoothingEnabled, the user agent must return the last value it was set to.",0,null,null],["Test that image smoothing is actually on by default and just the attribute value.",0,null,null],["Test that image smoothing works when imageSmoothingEnabled is set to true",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with drawImage().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fillRect and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fill() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with stroke() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) still works after repaints.",0,null,null]]]}]
14:03:53 INFO - .........
14:03:53 INFO - TEST-OK | /2dcontext/image-smoothing/imagesmoothing.html | took 859ms
14:03:53 INFO - PROCESS | 4012 | 1478642633360 Marionette TRACE conn4 -> [0,12,"getWindowHandle",null]
14:03:53 INFO - PROCESS | 4012 | 1478642633362 Marionette TRACE conn4 <- [1,12,null,{"value":"13"}]
14:03:53 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker
14:03:53 INFO - PROCESS | 4012 | 1478642633403 Marionette TRACE conn4 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:03:54 INFO - PROCESS | 4012 | 1478642634380 Marionette TRACE conn4 <- [1,13,null,{"value":null}]
14:03:54 INFO - PROCESS | 4012 | 1478642634421 Marionette TRACE conn4 -> [0,14,"getWindowHandles",null]
14:03:54 INFO - PROCESS | 4012 | 1478642634423 Marionette TRACE conn4 <- [1,14,null,["13"]]
14:03:54 INFO - PROCESS | 4012 | 1478642634447 Marionette TRACE conn4 -> [0,15,"switchToWindow",{"name":"13"}]
14:03:54 INFO - PROCESS | 4012 | 1478642634451 Marionette TRACE conn4 <- [1,15,null,{}]
14:03:54 INFO - PROCESS | 4012 | 1478642634507 Marionette TRACE conn4 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:03:54 INFO - PROCESS | 4012 | ++DOCSHELL 1B7E2C00 == 10 [pid = 4012] [id = 10]
14:03:54 INFO - PROCESS | 4012 | ++DOMWINDOW == 26 (1BF5D800) [pid = 4012] [serial = 26] [outer = 00000000]
14:03:54 INFO - PROCESS | 4012 | ++DOMWINDOW == 27 (1BFF0C00) [pid = 4012] [serial = 27] [outer = 1BF5D800]
14:03:54 INFO - PROCESS | 4012 | 1478642634570 Marionette DEBUG loaded listener.js
14:03:54 INFO - PROCESS | 4012 | ++DOMWINDOW == 28 (1BFF5400) [pid = 4012] [serial = 28] [outer = 1BF5D800]
14:03:54 INFO - PROCESS | 4012 | [4012] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:03:55 INFO - PROCESS | 4012 | --DOCSHELL 12E0C000 == 9 [pid = 4012] [id = 1]
14:03:55 INFO - PROCESS | 4012 | ++DOCSHELL 0EF5FC00 == 10 [pid = 4012] [id = 11]
14:03:55 INFO - PROCESS | 4012 | ++DOMWINDOW == 29 (0EF60400) [pid = 4012] [serial = 29] [outer = 00000000]
14:03:55 INFO - PROCESS | 4012 | ++DOMWINDOW == 30 (0EF67400) [pid = 4012] [serial = 30] [outer = 0EF60400]
14:03:55 INFO - PROCESS | 4012 | ++DOMWINDOW == 31 (0F282C00) [pid = 4012] [serial = 31] [outer = 0EF60400]
14:03:56 INFO - PROCESS | 4012 | ++DOCSHELL 01F54C00 == 11 [pid = 4012] [id = 12]
14:03:56 INFO - PROCESS | 4012 | ++DOMWINDOW == 32 (0F2F0000) [pid = 4012] [serial = 32] [outer = 00000000]
14:03:56 INFO - PROCESS | 4012 | ++DOMWINDOW == 33 (0FF1CC00) [pid = 4012] [serial = 33] [outer = 0F2F0000]
14:03:56 INFO - PROCESS | 4012 | ++DOMWINDOW == 34 (0FF24400) [pid = 4012] [serial = 34] [outer = 0F2F0000]
14:03:57 INFO - PROCESS | 4012 | --DOCSHELL 12E0D400 == 10 [pid = 4012] [id = 4]
14:04:05 INFO - PROCESS | 4012 | --DOMWINDOW == 33 (1B2BB800) [pid = 4012] [serial = 20] [outer = 00000000] [url = http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html]
14:04:05 INFO - PROCESS | 4012 | --DOMWINDOW == 32 (1545DC00) [pid = 4012] [serial = 8] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
14:04:05 INFO - PROCESS | 4012 | --DOMWINDOW == 31 (12E0C400) [pid = 4012] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html]
14:04:09 INFO - PROCESS | 4012 | --DOCSHELL 1B2BB400 == 9 [pid = 4012] [id = 8]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 30 (1B617C00) [pid = 4012] [serial = 24] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 29 (18C80400) [pid = 4012] [serial = 14] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 28 (1590AC00) [pid = 4012] [serial = 9] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 27 (15A64C00) [pid = 4012] [serial = 10] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 26 (132A7000) [pid = 4012] [serial = 4] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 25 (12E0D000) [pid = 4012] [serial = 2] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 24 (0FF1CC00) [pid = 4012] [serial = 33] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 23 (1904A400) [pid = 4012] [serial = 17] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 22 (0EF67400) [pid = 4012] [serial = 30] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 21 (1B2C2C00) [pid = 4012] [serial = 22] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 20 (1B2BEC00) [pid = 4012] [serial = 21] [outer = 00000000] [url = about:blank]
14:04:09 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (1BFF0C00) [pid = 4012] [serial = 27] [outer = 00000000] [url = about:blank]
14:04:24 INFO - PROCESS | 4012 | MARIONETTE LOG: INFO: Timeout fired
14:04:24 INFO - PROCESS | 4012 | 1478642664715 Marionette TRACE conn4 <- [1,16,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker",2,null,null,[]]}]
14:04:24 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker | took 31337ms
14:04:24 INFO - PROCESS | 4012 | 1478642664738 Marionette TRACE conn4 -> [0,17,"getWindowHandle",null]
14:04:24 INFO - PROCESS | 4012 | 1478642664742 Marionette TRACE conn4 <- [1,17,null,{"value":"13"}]
14:04:24 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker
14:04:24 INFO - PROCESS | 4012 | 1478642664750 Marionette TRACE conn4 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:04:24 INFO - PROCESS | 4012 | 1478642664887 Marionette TRACE conn4 <- [1,18,null,{"value":null}]
14:04:24 INFO - PROCESS | 4012 | 1478642664920 Marionette TRACE conn4 -> [0,19,"getWindowHandles",null]
14:04:24 INFO - PROCESS | 4012 | 1478642664924 Marionette TRACE conn4 <- [1,19,null,["13"]]
14:04:24 INFO - PROCESS | 4012 | 1478642664929 Marionette TRACE conn4 -> [0,20,"switchToWindow",{"name":"13"}]
14:04:24 INFO - PROCESS | 4012 | 1478642664935 Marionette TRACE conn4 <- [1,20,null,{}]
14:04:24 INFO - PROCESS | 4012 | 1478642664939 Marionette TRACE conn4 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:04:24 INFO - PROCESS | 4012 | ++DOCSHELL 0FF17400 == 10 [pid = 4012] [id = 13]
14:04:24 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (0FF17800) [pid = 4012] [serial = 35] [outer = 00000000]
14:04:24 INFO - PROCESS | 4012 | ++DOMWINDOW == 21 (126EDC00) [pid = 4012] [serial = 36] [outer = 0FF17800]
14:04:25 INFO - PROCESS | 4012 | 1478642665030 Marionette DEBUG loaded listener.js
14:04:25 INFO - PROCESS | 4012 | ++DOMWINDOW == 22 (12946400) [pid = 4012] [serial = 37] [outer = 0FF17800]
14:04:25 INFO - PROCESS | 4012 | [4012] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:04:26 INFO - PROCESS | 4012 | ++DOMWINDOW == 23 (13059800) [pid = 4012] [serial = 38] [outer = 0F2F0000]
14:04:34 INFO - PROCESS | 4012 | --DOCSHELL 1B7E2C00 == 9 [pid = 4012] [id = 10]
14:04:36 INFO - PROCESS | 4012 | --DOMWINDOW == 22 (1BF5D800) [pid = 4012] [serial = 26] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker]
14:04:42 INFO - PROCESS | 4012 | --DOMWINDOW == 21 (1BFF5400) [pid = 4012] [serial = 28] [outer = 00000000] [url = about:blank]
14:04:42 INFO - PROCESS | 4012 | --DOMWINDOW == 20 (126EDC00) [pid = 4012] [serial = 36] [outer = 00000000] [url = about:blank]
14:04:42 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (0FF24400) [pid = 4012] [serial = 34] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:04:50 INFO - PROCESS | 4012 | 1478642690291 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
14:04:55 INFO - PROCESS | 4012 | MARIONETTE LOG: INFO: Timeout fired
14:04:55 INFO - PROCESS | 4012 | 1478642695195 Marionette TRACE conn4 <- [1,21,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker",2,null,null,[]]}]
14:04:55 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker | took 30478ms
14:04:55 INFO - PROCESS | 4012 | 1478642695221 Marionette TRACE conn4 -> [0,22,"getWindowHandle",null]
14:04:55 INFO - PROCESS | 4012 | 1478642695224 Marionette TRACE conn4 <- [1,22,null,{"value":"13"}]
14:04:55 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/hkdf.worker
14:04:55 INFO - PROCESS | 4012 | 1478642695264 Marionette TRACE conn4 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:04:55 INFO - PROCESS | 4012 | 1478642695376 Marionette TRACE conn4 <- [1,23,null,{"value":null}]
14:04:55 INFO - PROCESS | 4012 | 1478642695383 Marionette TRACE conn4 -> [0,24,"getWindowHandles",null]
14:04:55 INFO - PROCESS | 4012 | 1478642695386 Marionette TRACE conn4 <- [1,24,null,["13"]]
14:04:55 INFO - PROCESS | 4012 | 1478642695392 Marionette TRACE conn4 -> [0,25,"switchToWindow",{"name":"13"}]
14:04:55 INFO - PROCESS | 4012 | 1478642695396 Marionette TRACE conn4 <- [1,25,null,{}]
14:04:55 INFO - PROCESS | 4012 | 1478642695402 Marionette TRACE conn4 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/hkdf.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:04:55 INFO - PROCESS | 4012 | ++DOCSHELL 13C5C400 == 10 [pid = 4012] [id = 14]
14:04:55 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (13CEB800) [pid = 4012] [serial = 39] [outer = 00000000]
14:04:55 INFO - PROCESS | 4012 | ++DOMWINDOW == 21 (13E5E800) [pid = 4012] [serial = 40] [outer = 13CEB800]
14:04:55 INFO - PROCESS | 4012 | 1478642695471 Marionette DEBUG loaded listener.js
14:04:55 INFO - PROCESS | 4012 | ++DOMWINDOW == 22 (13FD1400) [pid = 4012] [serial = 41] [outer = 13CEB800]
14:04:55 INFO - PROCESS | 4012 | [4012] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:05:08 INFO - PROCESS | 4012 | 1478642706858 Marionette TRACE conn4 <- [1,26,null,{"value":["/WebCryptoAPI/derive_bits_keys/hkdf.worker",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"]]]}]
14:05:10 INFO - .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
14:05:10 INFO - PROCESS | 4012 | --DOCSHELL 0FF17400 == 9 [pid = 4012] [id = 13]
14:05:10 INFO - .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
14:05:10 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/hkdf.worker | took 15466ms
14:05:10 INFO - PROCESS | 4012 | 1478642710761 Marionette TRACE conn4 -> [0,27,"getWindowHandle",null]
14:05:10 INFO - PROCESS | 4012 | 1478642710766 Marionette TRACE conn4 <- [1,27,null,{"value":"13"}]
14:05:10 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html
14:05:10 INFO - PROCESS | 4012 | 1478642710775 Marionette TRACE conn4 -> [0,28,"timeouts",{"script":185000}]
14:05:10 INFO - PROCESS | 4012 | 1478642710780 Marionette TRACE conn4 <- [1,28,null,{}]
14:05:10 INFO - PROCESS | 4012 | 1478642710787 Marionette TRACE conn4 -> [0,29,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:05:10 INFO - PROCESS | 4012 | 1478642710926 Marionette TRACE conn4 <- [1,29,null,{"value":null}]
14:05:10 INFO - PROCESS | 4012 | 1478642710980 Marionette TRACE conn4 -> [0,30,"getWindowHandles",null]
14:05:10 INFO - PROCESS | 4012 | 1478642710985 Marionette TRACE conn4 <- [1,30,null,["13"]]
14:05:10 INFO - PROCESS | 4012 | 1478642710990 Marionette TRACE conn4 -> [0,31,"switchToWindow",{"name":"13"}]
14:05:10 INFO - PROCESS | 4012 | 1478642710995 Marionette TRACE conn4 <- [1,31,null,{}]
14:05:11 INFO - PROCESS | 4012 | 1478642711003 Marionette TRACE conn4 -> [0,32,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:05:11 INFO - PROCESS | 4012 | ++DOCSHELL 13CF7000 == 10 [pid = 4012] [id = 15]
14:05:11 INFO - PROCESS | 4012 | ++DOMWINDOW == 23 (13E57000) [pid = 4012] [serial = 42] [outer = 00000000]
14:05:11 INFO - PROCESS | 4012 | ++DOMWINDOW == 24 (143BEC00) [pid = 4012] [serial = 43] [outer = 13E57000]
14:05:11 INFO - PROCESS | 4012 | 1478642711078 Marionette DEBUG loaded listener.js
14:05:11 INFO - PROCESS | 4012 | ++DOMWINDOW == 25 (145B8400) [pid = 4012] [serial = 44] [outer = 13E57000]
14:05:13 INFO - PROCESS | 4012 | --DOMWINDOW == 24 (0FF17800) [pid = 4012] [serial = 35] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker]
14:05:18 INFO - PROCESS | 4012 | --DOCSHELL 13C5C400 == 9 [pid = 4012] [id = 14]
14:05:18 INFO - PROCESS | 4012 | --DOMWINDOW == 23 (13E5E800) [pid = 4012] [serial = 40] [outer = 00000000] [url = about:blank]
14:05:18 INFO - PROCESS | 4012 | --DOMWINDOW == 22 (12946400) [pid = 4012] [serial = 37] [outer = 00000000] [url = about:blank]
14:05:20 INFO - PROCESS | 4012 | --DOMWINDOW == 21 (13CEB800) [pid = 4012] [serial = 39] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker]
14:05:25 INFO - PROCESS | 4012 | --DOMWINDOW == 20 (143BEC00) [pid = 4012] [serial = 43] [outer = 00000000] [url = about:blank]
14:05:25 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (13FD1400) [pid = 4012] [serial = 41] [outer = 00000000] [url = about:blank]
14:05:26 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (0EF69400) [pid = 4012] [serial = 45] [outer = 0F2F0000]
14:05:47 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (13059800) [pid = 4012] [serial = 38] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:06:56 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (13062800) [pid = 4012] [serial = 46] [outer = 0F2F0000]
14:07:13 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (0EF69400) [pid = 4012] [serial = 45] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:08:11 INFO - PROCESS | 4012 | MARIONETTE LOG: INFO: Timeout fired
14:08:11 INFO - PROCESS | 4012 | 1478642891240 Marionette TRACE conn4 <- [1,32,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html",2,null,null,[]]}]
14:08:11 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html | took 180530ms
14:08:11 INFO - PROCESS | 4012 | 1478642891287 Marionette TRACE conn4 -> [0,33,"getWindowHandle",null]
14:08:11 INFO - PROCESS | 4012 | 1478642891291 Marionette TRACE conn4 <- [1,33,null,{"value":"13"}]
14:08:11 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html
14:08:11 INFO - PROCESS | 4012 | 1478642891298 Marionette TRACE conn4 -> [0,34,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:08:11 INFO - PROCESS | 4012 | 1478642891427 Marionette TRACE conn4 <- [1,34,null,{"value":null}]
14:08:11 INFO - PROCESS | 4012 | 1478642891460 Marionette TRACE conn4 -> [0,35,"getWindowHandles",null]
14:08:11 INFO - PROCESS | 4012 | 1478642891464 Marionette TRACE conn4 <- [1,35,null,["13"]]
14:08:11 INFO - PROCESS | 4012 | 1478642891470 Marionette TRACE conn4 -> [0,36,"switchToWindow",{"name":"13"}]
14:08:11 INFO - PROCESS | 4012 | 1478642891474 Marionette TRACE conn4 <- [1,36,null,{}]
14:08:11 INFO - PROCESS | 4012 | 1478642891478 Marionette TRACE conn4 -> [0,37,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:08:11 INFO - PROCESS | 4012 | ++DOCSHELL 1473A400 == 10 [pid = 4012] [id = 16]
14:08:11 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (1473D800) [pid = 4012] [serial = 47] [outer = 00000000]
14:08:11 INFO - PROCESS | 4012 | ++DOMWINDOW == 21 (14743400) [pid = 4012] [serial = 48] [outer = 1473D800]
14:08:11 INFO - PROCESS | 4012 | 1478642891546 Marionette DEBUG loaded listener.js
14:08:11 INFO - PROCESS | 4012 | ++DOMWINDOW == 22 (147C3800) [pid = 4012] [serial = 49] [outer = 1473D800]
14:08:15 INFO - PROCESS | 4012 | --DOCSHELL 13CF7000 == 9 [pid = 4012] [id = 15]
14:08:17 INFO - PROCESS | 4012 | --DOMWINDOW == 21 (13E57000) [pid = 4012] [serial = 42] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html]
14:08:22 INFO - PROCESS | 4012 | --DOMWINDOW == 20 (14743400) [pid = 4012] [serial = 48] [outer = 00000000] [url = about:blank]
14:08:22 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (145B8400) [pid = 4012] [serial = 44] [outer = 00000000] [url = about:blank]
14:08:56 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (0FFB9C00) [pid = 4012] [serial = 50] [outer = 0F2F0000]
14:09:16 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (13062800) [pid = 4012] [serial = 46] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:11:11 INFO - PROCESS | 4012 | MARIONETTE LOG: INFO: Timeout fired
14:11:11 INFO - PROCESS | 4012 | 1478643071710 Marionette TRACE conn4 <- [1,37,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html",2,null,null,[]]}]
14:11:11 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html | took 180465ms
14:11:11 INFO - PROCESS | 4012 | 1478643071757 Marionette TRACE conn4 -> [0,38,"getWindowHandle",null]
14:11:11 INFO - PROCESS | 4012 | 1478643071762 Marionette TRACE conn4 <- [1,38,null,{"value":"13"}]
14:11:11 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_hkdf.html
14:11:11 INFO - PROCESS | 4012 | 1478643071800 Marionette TRACE conn4 -> [0,39,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:11:11 INFO - PROCESS | 4012 | 1478643071939 Marionette TRACE conn4 <- [1,39,null,{"value":null}]
14:11:11 INFO - PROCESS | 4012 | 1478643071972 Marionette TRACE conn4 -> [0,40,"getWindowHandles",null]
14:11:11 INFO - PROCESS | 4012 | 1478643071976 Marionette TRACE conn4 <- [1,40,null,["13"]]
14:11:11 INFO - PROCESS | 4012 | 1478643071982 Marionette TRACE conn4 -> [0,41,"switchToWindow",{"name":"13"}]
14:11:12 INFO - PROCESS | 4012 | 1478643071988 Marionette TRACE conn4 <- [1,41,null,{}]
14:11:12 INFO - PROCESS | 4012 | 1478643071992 Marionette TRACE conn4 -> [0,42,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_hkdf.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:11:12 INFO - PROCESS | 4012 | ++DOCSHELL 130D3C00 == 10 [pid = 4012] [id = 17]
14:11:12 INFO - PROCESS | 4012 | ++DOMWINDOW == 20 (130D4400) [pid = 4012] [serial = 51] [outer = 00000000]
14:11:12 INFO - PROCESS | 4012 | ++DOMWINDOW == 21 (132AA400) [pid = 4012] [serial = 52] [outer = 130D4400]
14:11:12 INFO - PROCESS | 4012 | 1478643072063 Marionette DEBUG loaded listener.js
14:11:12 INFO - PROCESS | 4012 | ++DOMWINDOW == 22 (13E5D800) [pid = 4012] [serial = 53] [outer = 130D4400]
14:11:22 INFO - PROCESS | 4012 | 1478643080608 Marionette TRACE conn4 <- [1,42,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_hkdf.html",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"]]]}]
14:11:23 INFO - ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
14:11:23 INFO - PROCESS | 4012 | --DOCSHELL 1473A400 == 9 [pid = 4012] [id = 16]
14:11:24 INFO - .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
14:11:24 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/test_hkdf.html | took 12719ms
14:11:24 INFO - PROCESS | 4012 | 1478643084530 Marionette TRACE conn4 -> [0,43,"getWindowHandle",null]
14:11:24 INFO - PROCESS | 4012 | 1478643084534 Marionette TRACE conn4 <- [1,43,null,{"value":"13"}]
14:11:24 INFO - TEST-START | /XMLHttpRequest/FormData-append.html
14:11:24 INFO - PROCESS | 4012 | 1478643084543 Marionette TRACE conn4 -> [0,44,"timeouts",{"script":35000}]
14:11:24 INFO - PROCESS | 4012 | 1478643084548 Marionette TRACE conn4 <- [1,44,null,{}]
14:11:24 INFO - PROCESS | 4012 | 1478643084555 Marionette TRACE conn4 -> [0,45,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:11:24 INFO - PROCESS | 4012 | 1478643084715 Marionette TRACE conn4 <- [1,45,null,{"value":null}]
14:11:24 INFO - PROCESS | 4012 | 1478643084723 Marionette TRACE conn4 -> [0,46,"getWindowHandles",null]
14:11:24 INFO - PROCESS | 4012 | 1478643084728 Marionette TRACE conn4 <- [1,46,null,["13"]]
14:11:24 INFO - PROCESS | 4012 | 1478643084732 Marionette TRACE conn4 -> [0,47,"switchToWindow",{"name":"13"}]
14:11:24 INFO - PROCESS | 4012 | 1478643084737 Marionette TRACE conn4 <- [1,47,null,{}]
14:11:24 INFO - PROCESS | 4012 | 1478643084746 Marionette TRACE conn4 -> [0,48,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/FormData-append.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/FormData-append.html\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:11:24 INFO - PROCESS | 4012 | ++DOCSHELL 147EF400 == 10 [pid = 4012] [id = 18]
14:11:24 INFO - PROCESS | 4012 | ++DOMWINDOW == 23 (147F0800) [pid = 4012] [serial = 54] [outer = 00000000]
14:11:24 INFO - PROCESS | 4012 | ++DOMWINDOW == 24 (16C86800) [pid = 4012] [serial = 55] [outer = 147F0800]
14:11:24 INFO - PROCESS | 4012 | 1478643084821 Marionette DEBUG loaded listener.js
14:11:24 INFO - PROCESS | 4012 | ++DOMWINDOW == 25 (16C8B800) [pid = 4012] [serial = 56] [outer = 147F0800]
14:11:25 INFO - PROCESS | 4012 | 1478643085226 Marionette TRACE conn4 <- [1,48,null,{"value":["/XMLHttpRequest/FormData-append.html",0,null,null,[["Passing a String object to FormData.append should work.",0,null,null],["testFormDataAppend1",0,null,null],["testFormDataAppend2",0,null,null],["testFormDataAppendUndefined1",0,null,null],["testFormDataAppendUndefined2",0,null,null],["testFormDataAppendNull1",0,null,null],["testFormDataAppendNull2",0,null,null],["testFormDataAppendToForm1",0,null,null],["testFormDataAppendToForm2",0,null,null],["testFormDataAppendToFormUndefined1",0,null,null],["testFormDataAppendToFormUndefined2",0,null,null],["testFormDataAppendToFormNull1",0,null,null],["testFormDataAppendToFormNull2",0,null,null],["testFormDataAppendEmptyBlob",0,null,null]]]}]
14:11:25 INFO - ..............
14:11:25 INFO - TEST-OK | /XMLHttpRequest/FormData-append.html | took 734ms
14:11:25 INFO - PROCESS | 4012 | 1478643085283 Marionette TRACE conn4 -> [0,49,"getWindowHandle",null]
14:11:25 INFO - PROCESS | 4012 | 1478643085287 Marionette TRACE conn4 <- [1,49,null,{"value":"13"}]
14:11:25 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html
14:11:25 INFO - PROCESS | 4012 | 1478643085292 Marionette TRACE conn4 -> [0,50,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:11:25 INFO - PROCESS | 4012 | 1478643085410 Marionette TRACE conn4 <- [1,50,null,{"value":null}]
14:11:25 INFO - PROCESS | 4012 | 1478643085418 Marionette TRACE conn4 -> [0,51,"getWindowHandles",null]
14:11:25 INFO - PROCESS | 4012 | 1478643085421 Marionette TRACE conn4 <- [1,51,null,["13"]]
14:11:25 INFO - PROCESS | 4012 | 1478643085426 Marionette TRACE conn4 -> [0,52,"switchToWindow",{"name":"13"}]
14:11:25 INFO - PROCESS | 4012 | 1478643085430 Marionette TRACE conn4 <- [1,52,null,{}]
14:11:25 INFO - PROCESS | 4012 | 1478643085441 Marionette TRACE conn4 -> [0,53,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:11:25 INFO - PROCESS | 4012 | ++DOCSHELL 16C88C00 == 11 [pid = 4012] [id = 19]
14:11:25 INFO - PROCESS | 4012 | ++DOMWINDOW == 26 (18312C00) [pid = 4012] [serial = 57] [outer = 00000000]
14:11:25 INFO - PROCESS | 4012 | ++DOMWINDOW == 27 (1849D800) [pid = 4012] [serial = 58] [outer = 18312C00]
14:11:25 INFO - PROCESS | 4012 | 1478643085510 Marionette DEBUG loaded listener.js
14:11:25 INFO - PROCESS | 4012 | ++DOMWINDOW == 28 (184A3400) [pid = 4012] [serial = 59] [outer = 18312C00]
14:11:25 INFO - PROCESS | 4012 | [4012] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:11:26 INFO - PROCESS | 4012 | --DOCSHELL 0EF5FC00 == 10 [pid = 4012] [id = 11]
14:11:26 INFO - PROCESS | 4012 | --DOMWINDOW == 27 (1473D800) [pid = 4012] [serial = 47] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html]
14:11:26 INFO - PROCESS | 4012 | 1478643086890 Marionette TRACE conn4 <- [1,53,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html",0,null,null,[["default value is false, set value is true",0,null,null],["can also be set in OPEN state",0,null,null],["setting on synchronous XHR",0,null,null],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,null,null],["setting withCredentials when in DONE state (synchronous)",0,null,null]]]}]
14:11:26 INFO - .....
14:11:26 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html | took 1657ms
14:11:26 INFO - PROCESS | 4012 | 1478643086950 Marionette TRACE conn4 -> [0,54,"getWindowHandle",null]
14:11:26 INFO - PROCESS | 4012 | 1478643086952 Marionette TRACE conn4 <- [1,54,null,{"value":"13"}]
14:11:26 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker
14:11:26 INFO - PROCESS | 4012 | 1478643086957 Marionette TRACE conn4 -> [0,55,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:11:27 INFO - PROCESS | 4012 | 1478643087067 Marionette TRACE conn4 <- [1,55,null,{"value":null}]
14:11:27 INFO - PROCESS | 4012 | 1478643087072 Marionette TRACE conn4 -> [0,56,"getWindowHandles",null]
14:11:27 INFO - PROCESS | 4012 | 1478643087075 Marionette TRACE conn4 <- [1,56,null,["13"]]
14:11:27 INFO - PROCESS | 4012 | 1478643087078 Marionette TRACE conn4 -> [0,57,"switchToWindow",{"name":"13"}]
14:11:27 INFO - PROCESS | 4012 | 1478643087083 Marionette TRACE conn4 <- [1,57,null,{}]
14:11:27 INFO - PROCESS | 4012 | 1478643087087 Marionette TRACE conn4 -> [0,58,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\", \"90ed3f38-55e1-4c24-a407-9ffb42190da3\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:11:27 INFO - PROCESS | 4012 | ++DOCSHELL 18C5C400 == 11 [pid = 4012] [id = 20]
14:11:27 INFO - PROCESS | 4012 | ++DOMWINDOW == 28 (18C5DC00) [pid = 4012] [serial = 60] [outer = 00000000]
14:11:27 INFO - PROCESS | 4012 | ++DOMWINDOW == 29 (18C63400) [pid = 4012] [serial = 61] [outer = 18C5DC00]
14:11:27 INFO - PROCESS | 4012 | 1478643087158 Marionette DEBUG loaded listener.js
14:11:27 INFO - PROCESS | 4012 | ++DOMWINDOW == 30 (18C67000) [pid = 4012] [serial = 62] [outer = 18C5DC00]
14:11:27 INFO - PROCESS | 4012 | [4012] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:11:32 INFO - PROCESS | 4012 | --DOCSHELL 16C88C00 == 10 [pid = 4012] [id = 19]
14:11:32 INFO - PROCESS | 4012 | --DOCSHELL 147EF400 == 9 [pid = 4012] [id = 18]
14:11:32 INFO - PROCESS | 4012 | --DOCSHELL 130D3C00 == 8 [pid = 4012] [id = 17]
14:11:32 INFO - PROCESS | 4012 | --DOCSHELL 01F54C00 == 7 [pid = 4012] [id = 12]
14:11:32 INFO - PROCESS | 4012 | --DOMWINDOW == 29 (147C3800) [pid = 4012] [serial = 49] [outer = 00000000] [url = about:blank]
14:11:32 INFO - PROCESS | 4012 | --DOMWINDOW == 28 (132AA400) [pid = 4012] [serial = 52] [outer = 00000000] [url = about:blank]
14:11:35 INFO - PROCESS | 4012 | --DOMWINDOW == 27 (130D4400) [pid = 4012] [serial = 51] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html]
14:11:35 INFO - PROCESS | 4012 | --DOMWINDOW == 26 (147F0800) [pid = 4012] [serial = 54] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/FormData-append.html]
14:11:35 INFO - PROCESS | 4012 | --DOMWINDOW == 25 (18312C00) [pid = 4012] [serial = 57] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html]
14:11:35 INFO - PROCESS | 4012 | --DOMWINDOW == 24 (0F2F0000) [pid = 4012] [serial = 32] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:11:35 INFO - PROCESS | 4012 | --DOMWINDOW == 23 (0EF60400) [pid = 4012] [serial = 29] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 22 (13E5D800) [pid = 4012] [serial = 53] [outer = 00000000] [url = about:blank]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 21 (184A3400) [pid = 4012] [serial = 59] [outer = 00000000] [url = about:blank]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 20 (1849D800) [pid = 4012] [serial = 58] [outer = 00000000] [url = about:blank]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 19 (18C63400) [pid = 4012] [serial = 61] [outer = 00000000] [url = about:blank]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 18 (16C86800) [pid = 4012] [serial = 55] [outer = 00000000] [url = about:blank]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 17 (16C8B800) [pid = 4012] [serial = 56] [outer = 00000000] [url = about:blank]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 16 (0FFB9C00) [pid = 4012] [serial = 50] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:11:39 INFO - PROCESS | 4012 | --DOMWINDOW == 15 (0F282C00) [pid = 4012] [serial = 31] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
14:11:57 INFO - PROCESS | 4012 | MARIONETTE LOG: INFO: Timeout fired
14:11:57 INFO - PROCESS | 4012 | JavaScript error: executormarionette.py, line 33: TypeError: window.wrappedJSObject.win.timeout is not a function
14:12:02 INFO - PROCESS | 4012 | 1478643122114 Marionette TRACE conn4 <- [1,58,{"error":"script timeout","message":"Timed out","stacktrace":""},null]
14:12:02 INFO - TEST-TIMEOUT | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker | took 35220ms
14:12:02 WARNING - u'runner_teardown' ()
14:12:02 INFO - Setting up ssl
14:12:02 INFO - PROCESS | certutil |
14:12:02 INFO - PROCESS | certutil |
14:12:02 INFO - PROCESS | certutil |
14:12:02 INFO - Certificate Nickname Trust Attributes
14:12:02 INFO - SSL,S/MIME,JAR/XPI
14:12:02 INFO -
14:12:02 INFO - web-platform-tests CT,,
14:12:02 INFO -
14:12:02 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\docume~1\cltbld~1.t-x\locals~1\temp\tmpjxn33q.mozrunner
14:12:02 INFO - Starting runner
14:12:03 INFO - PROCESS | 2300 | [2300] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/startupcache/StartupCache.cpp, line 219
14:12:03 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
14:12:03 INFO - PROCESS | 2300 | [2300] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
14:12:05 INFO - PROCESS | 2300 | 1478643125097 Marionette DEBUG Marionette enabled via build flag and pref
14:12:05 INFO - PROCESS | 2300 | ++DOCSHELL 12E0C000 == 1 [pid = 2300] [id = 1]
14:12:05 INFO - PROCESS | 2300 | ++DOMWINDOW == 1 (12E0C400) [pid = 2300] [serial = 1] [outer = 00000000]
14:12:05 INFO - PROCESS | 2300 | ++DOMWINDOW == 2 (12E0D000) [pid = 2300] [serial = 2] [outer = 12E0C400]
14:12:05 INFO - PROCESS | 2300 | [2300] WARNING: Dwm composition not available, falling back to software vsync: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 2011
14:12:05 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/io/nsDirectoryService.cpp, line 500
14:12:05 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 794
14:12:05 INFO - PROCESS | 2300 | [2300] WARNING: Failed to determine sandbox temp dir path.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 867
14:12:05 INFO - PROCESS | 2300 | ++DOCSHELL 1369F000 == 2 [pid = 2300] [id = 2]
14:12:05 INFO - PROCESS | 2300 | ++DOMWINDOW == 3 (1369F400) [pid = 2300] [serial = 3] [outer = 00000000]
14:12:05 INFO - PROCESS | 2300 | ++DOMWINDOW == 4 (136A0000) [pid = 2300] [serial = 4] [outer = 1369F400]
14:12:05 INFO - PROCESS | 2300 | 1478643125944 Marionette INFO Listening on port 2829
14:12:06 INFO - PROCESS | 2300 | 1478643126924 Marionette DEBUG Marionette enabled via command-line flag
14:12:06 INFO - PROCESS | 2300 | ++DOCSHELL 14930000 == 3 [pid = 2300] [id = 3]
14:12:06 INFO - PROCESS | 2300 | ++DOMWINDOW == 5 (14930400) [pid = 2300] [serial = 5] [outer = 00000000]
14:12:06 INFO - PROCESS | 2300 | ++DOMWINDOW == 6 (14931000) [pid = 2300] [serial = 6] [outer = 14930400]
14:12:07 INFO - PROCESS | 2300 | ++DOMWINDOW == 7 (147EC400) [pid = 2300] [serial = 7] [outer = 1369F400]
14:12:07 INFO - PROCESS | 2300 | 1478643127211 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:1827
14:12:07 INFO - PROCESS | 2300 | 1478643127230 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:1828
14:12:07 INFO - PROCESS | 2300 | 1478643127266 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:1829
14:12:07 INFO - PROCESS | 2300 | 1478643127269 Marionette DEBUG Closed connection conn0
14:12:07 INFO - PROCESS | 2300 | 1478643127271 Marionette DEBUG Closed connection conn1
14:12:07 INFO - PROCESS | 2300 | 1478643127360 Marionette DEBUG Closed connection conn2
14:12:07 INFO - PROCESS | 2300 | 1478643127366 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:1830
14:12:07 INFO - PROCESS | 2300 | 1478643127385 Marionette DEBUG Closed connection conn3
14:12:07 INFO - PROCESS | 2300 | 1478643127391 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:1831
14:12:07 INFO - PROCESS | 2300 | ++DOCSHELL 12E0D400 == 4 [pid = 2300] [id = 4]
14:12:07 INFO - PROCESS | 2300 | ++DOMWINDOW == 8 (15220400) [pid = 2300] [serial = 8] [outer = 00000000]
14:12:07 INFO - PROCESS | 2300 | ++DOMWINDOW == 9 (153DA000) [pid = 2300] [serial = 9] [outer = 15220400]
14:12:07 INFO - PROCESS | 2300 | ++DOMWINDOW == 10 (15365400) [pid = 2300] [serial = 10] [outer = 15220400]
14:12:07 INFO - PROCESS | 2300 | 1478643127604 Marionette TRACE conn4 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
14:12:07 INFO - PROCESS | 2300 | 1478643127611 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161108115122","processId":2300,"version":"52.0a1"}
14:12:07 INFO - PROCESS | 2300 | [2300] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
14:12:07 INFO - PROCESS | 2300 | [2300] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
14:12:08 INFO - PROCESS | 2300 | [2300] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
14:12:08 INFO - PROCESS | 2300 | [2300] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
14:12:08 INFO - PROCESS | 2300 | [2300] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:12:08 INFO - PROCESS | 2300 | ++DOCSHELL 17724800 == 5 [pid = 2300] [id = 5]
14:12:08 INFO - PROCESS | 2300 | ++DOMWINDOW == 11 (17726C00) [pid = 2300] [serial = 11] [outer = 00000000]
14:12:08 INFO - PROCESS | 2300 | ++DOCSHELL 17727400 == 6 [pid = 2300] [id = 6]
14:12:08 INFO - PROCESS | 2300 | ++DOMWINDOW == 12 (17727C00) [pid = 2300] [serial = 12] [outer = 00000000]
14:12:09 INFO - PROCESS | 2300 | ++DOCSHELL 18926400 == 7 [pid = 2300] [id = 7]
14:12:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 13 (18926800) [pid = 2300] [serial = 13] [outer = 00000000]
14:12:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 14 (18AC4400) [pid = 2300] [serial = 14] [outer = 18926800]
14:12:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 15 (1768B000) [pid = 2300] [serial = 15] [outer = 17726C00]
14:12:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 16 (1768C000) [pid = 2300] [serial = 16] [outer = 17727C00]
14:12:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 17 (1768DC00) [pid = 2300] [serial = 17] [outer = 18926800]
14:12:10 INFO - PROCESS | 2300 | 1478643130069 Marionette DEBUG loaded listener.js
14:12:10 INFO - PROCESS | 2300 | ++DOMWINDOW == 18 (19A61400) [pid = 2300] [serial = 18] [outer = 18926800]
14:12:10 INFO - PROCESS | 2300 | 1478643130856 Marionette TRACE conn4 <- [1,1,null,{"sessionId":"07cf6972-b887-4e10-bc66-9d5956bb53a0","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161108115122","processId":2300,"version":"52.0a1","command_id":1}}]
14:12:10 INFO - PROCESS | 2300 | 1478643130968 Marionette TRACE conn4 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
14:12:11 INFO - PROCESS | 2300 | 1478643131054 Marionette TRACE conn4 <- [1,2,null,{"value":null}]
14:12:11 INFO - PROCESS | 2300 | 1478643131098 Marionette TRACE conn4 -> [0,3,"getWindowHandle",null]
14:12:11 INFO - PROCESS | 2300 | 1478643131103 Marionette TRACE conn4 <- [1,3,null,{"value":"13"}]
14:12:11 INFO - PROCESS | 2300 | 1478643131220 Marionette TRACE conn4 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
14:12:11 INFO - PROCESS | 2300 | [2300] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
14:12:11 INFO - PROCESS | 2300 | ++DOMWINDOW == 19 (1A368000) [pid = 2300] [serial = 19] [outer = 18926800]
14:12:11 INFO - PROCESS | 2300 | 1478643131808 Marionette TRACE conn4 <- [1,4,null,{}]
14:12:11 INFO - PROCESS | 2300 | 1478643131818 Marionette TRACE conn4 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
14:12:11 INFO - PROCESS | 2300 | 1478643131841 Marionette TRACE conn4 <- [1,5,null,{"value":null}]
14:12:11 INFO - PROCESS | 2300 | 1478643131866 Marionette TRACE conn4 -> [0,6,"getWindowHandle",null]
14:12:11 INFO - PROCESS | 2300 | 1478643131871 Marionette TRACE conn4 <- [1,6,null,{"value":"13"}]
14:12:11 INFO - TEST-START | /XMLHttpRequest/abort-after-receive.htm
14:12:11 INFO - PROCESS | 2300 | 1478643131922 Marionette TRACE conn4 -> [0,7,"timeouts",{"script":35000}]
14:12:11 INFO - PROCESS | 2300 | 1478643131927 Marionette TRACE conn4 <- [1,7,null,{}]
14:12:12 INFO - PROCESS | 2300 | 1478643132011 Marionette TRACE conn4 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:12 INFO - PROCESS | 2300 | 1478643132039 Marionette TRACE conn4 <- [1,8,null,{"value":null}]
14:12:12 INFO - PROCESS | 2300 | 1478643132049 Marionette TRACE conn4 -> [0,9,"getWindowHandles",null]
14:12:12 INFO - PROCESS | 2300 | 1478643132052 Marionette TRACE conn4 <- [1,9,null,["13"]]
14:12:12 INFO - PROCESS | 2300 | 1478643132072 Marionette TRACE conn4 -> [0,10,"switchToWindow",{"name":"13"}]
14:12:12 INFO - PROCESS | 2300 | 1478643132075 Marionette TRACE conn4 <- [1,10,null,{}]
14:12:12 INFO - PROCESS | 2300 | 1478643132094 Marionette TRACE conn4 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-receive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:12 INFO - PROCESS | 2300 | ++DOCSHELL 1B027800 == 8 [pid = 2300] [id = 8]
14:12:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 20 (1B027C00) [pid = 2300] [serial = 20] [outer = 00000000]
14:12:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 21 (1B02B000) [pid = 2300] [serial = 21] [outer = 1B027C00]
14:12:12 INFO - PROCESS | 2300 | 1478643132170 Marionette DEBUG loaded listener.js
14:12:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 22 (1B02F400) [pid = 2300] [serial = 22] [outer = 1B027C00]
14:12:12 INFO - PROCESS | 2300 | ++DOCSHELL 1AD0FC00 == 9 [pid = 2300] [id = 9]
14:12:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 23 (1B031800) [pid = 2300] [serial = 23] [outer = 00000000]
14:12:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 24 (1B1D4C00) [pid = 2300] [serial = 24] [outer = 1B031800]
14:12:12 INFO - PROCESS | 2300 | 1478643132479 Marionette DEBUG loaded listener.js
14:12:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 25 (1B1D5800) [pid = 2300] [serial = 25] [outer = 1B031800]
14:12:13 INFO - PROCESS | 2300 | 1478643132999 Marionette TRACE conn4 <- [1,11,null,{"value":["/XMLHttpRequest/abort-after-receive.htm",0,null,null,[["XMLHttpRequest: abort() after successful receive should not fire \"abort\" event",0,null,null]]]}]
14:12:13 INFO - .
14:12:13 INFO - TEST-OK | /XMLHttpRequest/abort-after-receive.htm | took 1156ms
14:12:13 INFO - TEST-START | /XMLHttpRequest/abort-after-send.htm
14:12:13 INFO - PROCESS | 2300 | 1478643133046 Marionette TRACE conn4 -> [0,12,"getWindowHandle",null]
14:12:13 INFO - PROCESS | 2300 | 1478643133048 Marionette TRACE conn4 <- [1,12,null,{"value":"13"}]
14:12:13 INFO - PROCESS | 2300 | 1478643133052 Marionette TRACE conn4 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:13 INFO - PROCESS | 2300 | 1478643133183 Marionette TRACE conn4 <- [1,13,null,{"value":null}]
14:12:13 INFO - PROCESS | 2300 | 1478643133190 Marionette TRACE conn4 -> [0,14,"getWindowHandles",null]
14:12:13 INFO - PROCESS | 2300 | 1478643133192 Marionette TRACE conn4 <- [1,14,null,["13"]]
14:12:13 INFO - PROCESS | 2300 | 1478643133195 Marionette TRACE conn4 -> [0,15,"switchToWindow",{"name":"13"}]
14:12:13 INFO - PROCESS | 2300 | 1478643133199 Marionette TRACE conn4 <- [1,15,null,{}]
14:12:13 INFO - PROCESS | 2300 | 1478643133203 Marionette TRACE conn4 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:13 INFO - PROCESS | 2300 | ++DOCSHELL 16AB8400 == 10 [pid = 2300] [id = 10]
14:12:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 26 (16AB8800) [pid = 2300] [serial = 26] [outer = 00000000]
14:12:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 27 (16ABBC00) [pid = 2300] [serial = 27] [outer = 16AB8800]
14:12:13 INFO - PROCESS | 2300 | 1478643133267 Marionette DEBUG loaded listener.js
14:12:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 28 (1B48B800) [pid = 2300] [serial = 28] [outer = 16AB8800]
14:12:13 INFO - PROCESS | 2300 | 1478643133609 Marionette TRACE conn4 <- [1,16,null,{"value":["/XMLHttpRequest/abort-after-send.htm",0,null,null,[["XMLHttpRequest: abort() after send()",0,null,null]]]}]
14:12:13 INFO - .
14:12:13 INFO - TEST-OK | /XMLHttpRequest/abort-after-send.htm | took 594ms
14:12:13 INFO - PROCESS | 2300 | 1478643133646 Marionette TRACE conn4 -> [0,17,"getWindowHandle",null]
14:12:13 INFO - PROCESS | 2300 | 1478643133648 Marionette TRACE conn4 <- [1,17,null,{"value":"13"}]
14:12:13 INFO - TEST-START | /XMLHttpRequest/abort-after-stop.htm
14:12:13 INFO - PROCESS | 2300 | 1478643133653 Marionette TRACE conn4 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:13 INFO - PROCESS | 2300 | 1478643133772 Marionette TRACE conn4 <- [1,18,null,{"value":null}]
14:12:13 INFO - PROCESS | 2300 | 1478643133778 Marionette TRACE conn4 -> [0,19,"getWindowHandles",null]
14:12:13 INFO - PROCESS | 2300 | 1478643133781 Marionette TRACE conn4 <- [1,19,null,["13"]]
14:12:13 INFO - PROCESS | 2300 | 1478643133784 Marionette TRACE conn4 -> [0,20,"switchToWindow",{"name":"13"}]
14:12:13 INFO - PROCESS | 2300 | 1478643133788 Marionette TRACE conn4 <- [1,20,null,{}]
14:12:13 INFO - PROCESS | 2300 | 1478643133793 Marionette TRACE conn4 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-stop.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:13 INFO - PROCESS | 2300 | ++DOCSHELL 1818E800 == 11 [pid = 2300] [id = 11]
14:12:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 29 (18190400) [pid = 2300] [serial = 29] [outer = 00000000]
14:12:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 30 (1BD25800) [pid = 2300] [serial = 30] [outer = 18190400]
14:12:13 INFO - PROCESS | 2300 | 1478643133855 Marionette DEBUG loaded listener.js
14:12:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 31 (1BD2F400) [pid = 2300] [serial = 31] [outer = 18190400]
14:12:15 INFO - PROCESS | 2300 | ++DOCSHELL 01F5C000 == 12 [pid = 2300] [id = 12]
14:12:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 32 (01F5C800) [pid = 2300] [serial = 32] [outer = 00000000]
14:12:15 INFO - PROCESS | 2300 | --DOCSHELL 12E0C000 == 11 [pid = 2300] [id = 1]
14:12:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 33 (0EF5F800) [pid = 2300] [serial = 33] [outer = 01F5C800]
14:12:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 34 (0F066000) [pid = 2300] [serial = 34] [outer = 01F5C800]
14:12:15 INFO - PROCESS | 2300 | ++DOCSHELL 0EF67400 == 12 [pid = 2300] [id = 13]
14:12:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 35 (0EFF0000) [pid = 2300] [serial = 35] [outer = 00000000]
14:12:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 36 (0FB0D000) [pid = 2300] [serial = 36] [outer = 0EFF0000]
14:12:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 37 (0FF20400) [pid = 2300] [serial = 37] [outer = 0EFF0000]
14:12:17 INFO - PROCESS | 2300 | --DOCSHELL 16AB8400 == 11 [pid = 2300] [id = 10]
14:12:17 INFO - PROCESS | 2300 | --DOCSHELL 1B027800 == 10 [pid = 2300] [id = 8]
14:12:17 INFO - PROCESS | 2300 | --DOCSHELL 12E0D400 == 9 [pid = 2300] [id = 4]
14:12:25 INFO - PROCESS | 2300 | --DOMWINDOW == 36 (15220400) [pid = 2300] [serial = 8] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
14:12:25 INFO - PROCESS | 2300 | --DOMWINDOW == 35 (12E0C400) [pid = 2300] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html]
14:12:25 INFO - PROCESS | 2300 | --DOMWINDOW == 34 (16AB8800) [pid = 2300] [serial = 26] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm]
14:12:25 INFO - PROCESS | 2300 | --DOMWINDOW == 33 (1B027C00) [pid = 2300] [serial = 20] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 32 (1B1D4C00) [pid = 2300] [serial = 24] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 31 (18AC4400) [pid = 2300] [serial = 14] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 30 (153DA000) [pid = 2300] [serial = 9] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 29 (15365400) [pid = 2300] [serial = 10] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 28 (136A0000) [pid = 2300] [serial = 4] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 27 (12E0D000) [pid = 2300] [serial = 2] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 26 (1768DC00) [pid = 2300] [serial = 17] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 25 (0FB0D000) [pid = 2300] [serial = 36] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 24 (1BD25800) [pid = 2300] [serial = 30] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 23 (16ABBC00) [pid = 2300] [serial = 27] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 22 (1B48B800) [pid = 2300] [serial = 28] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 21 (1B02B000) [pid = 2300] [serial = 21] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 20 (1B02F400) [pid = 2300] [serial = 22] [outer = 00000000] [url = about:blank]
14:12:29 INFO - PROCESS | 2300 | --DOMWINDOW == 19 (0EF5F800) [pid = 2300] [serial = 33] [outer = 00000000] [url = about:blank]
14:12:43 INFO - PROCESS | 2300 | MARIONETTE LOG: INFO: Timeout fired
14:12:44 INFO - PROCESS | 2300 | 1478643164008 Marionette TRACE conn4 <- [1,21,null,{"value":["/XMLHttpRequest/abort-after-stop.htm",2,null,null,[["XMLHttpRequest: abort event should fire when stop() method is used",1,"assert_equals: expected true but got false","@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:24:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:23:11\nsetTimeout handler*@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:22:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:13:7\n"]]]}]
14:12:44 INFO - .
14:12:44 INFO - TEST-TIMEOUT | /XMLHttpRequest/abort-after-stop.htm | took 30392ms
14:12:44 INFO - PROCESS | 2300 | 1478643164042 Marionette TRACE conn4 -> [0,22,"getWindowHandle",null]
14:12:44 INFO - PROCESS | 2300 | 1478643164046 Marionette TRACE conn4 <- [1,22,null,{"value":"13"}]
14:12:44 INFO - TEST-START | /XMLHttpRequest/abort-after-timeout.htm
14:12:44 INFO - PROCESS | 2300 | 1478643164053 Marionette TRACE conn4 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:44 INFO - PROCESS | 2300 | 1478643164185 Marionette TRACE conn4 <- [1,23,null,{"value":null}]
14:12:44 INFO - PROCESS | 2300 | 1478643164218 Marionette TRACE conn4 -> [0,24,"getWindowHandles",null]
14:12:44 INFO - PROCESS | 2300 | 1478643164222 Marionette TRACE conn4 <- [1,24,null,["13"]]
14:12:44 INFO - PROCESS | 2300 | 1478643164227 Marionette TRACE conn4 -> [0,25,"switchToWindow",{"name":"13"}]
14:12:44 INFO - PROCESS | 2300 | 1478643164233 Marionette TRACE conn4 <- [1,25,null,{}]
14:12:44 INFO - PROCESS | 2300 | 1478643164238 Marionette TRACE conn4 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:44 INFO - PROCESS | 2300 | ++DOCSHELL 0FBEFC00 == 10 [pid = 2300] [id = 14]
14:12:44 INFO - PROCESS | 2300 | ++DOMWINDOW == 20 (0FBF0000) [pid = 2300] [serial = 38] [outer = 00000000]
14:12:44 INFO - PROCESS | 2300 | ++DOMWINDOW == 21 (124DD800) [pid = 2300] [serial = 39] [outer = 0FBF0000]
14:12:44 INFO - PROCESS | 2300 | 1478643164328 Marionette DEBUG loaded listener.js
14:12:44 INFO - PROCESS | 2300 | ++DOMWINDOW == 22 (129B2000) [pid = 2300] [serial = 40] [outer = 0FBF0000]
14:12:44 INFO - PROCESS | 2300 | 1478643164952 Marionette TRACE conn4 <- [1,26,null,{"value":["/XMLHttpRequest/abort-after-timeout.htm",0,null,null,[["XMLHttpRequest: abort() after a timeout should not fire \"abort\" event",0,null,null]]]}]
14:12:44 INFO - .
14:12:44 INFO - TEST-OK | /XMLHttpRequest/abort-after-timeout.htm | took 938ms
14:12:45 INFO - PROCESS | 2300 | 1478643164997 Marionette TRACE conn4 -> [0,27,"getWindowHandle",null]
14:12:45 INFO - PROCESS | 2300 | 1478643165001 Marionette TRACE conn4 <- [1,27,null,{"value":"13"}]
14:12:45 INFO - TEST-START | /XMLHttpRequest/abort-during-done.htm
14:12:45 INFO - PROCESS | 2300 | 1478643165006 Marionette TRACE conn4 -> [0,28,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:45 INFO - PROCESS | 2300 | 1478643165138 Marionette TRACE conn4 <- [1,28,null,{"value":null}]
14:12:45 INFO - PROCESS | 2300 | 1478643165146 Marionette TRACE conn4 -> [0,29,"getWindowHandles",null]
14:12:45 INFO - PROCESS | 2300 | 1478643165149 Marionette TRACE conn4 <- [1,29,null,["13"]]
14:12:45 INFO - PROCESS | 2300 | 1478643165153 Marionette TRACE conn4 -> [0,30,"switchToWindow",{"name":"13"}]
14:12:45 INFO - PROCESS | 2300 | 1478643165158 Marionette TRACE conn4 <- [1,30,null,{}]
14:12:45 INFO - PROCESS | 2300 | 1478643165163 Marionette TRACE conn4 -> [0,31,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-done.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:45 INFO - PROCESS | 2300 | ++DOCSHELL 12942800 == 11 [pid = 2300] [id = 15]
14:12:45 INFO - PROCESS | 2300 | ++DOMWINDOW == 23 (13697400) [pid = 2300] [serial = 41] [outer = 00000000]
14:12:45 INFO - PROCESS | 2300 | ++DOMWINDOW == 24 (136A2000) [pid = 2300] [serial = 42] [outer = 13697400]
14:12:45 INFO - PROCESS | 2300 | 1478643165229 Marionette DEBUG loaded listener.js
14:12:45 INFO - PROCESS | 2300 | ++DOMWINDOW == 25 (13E0D000) [pid = 2300] [serial = 43] [outer = 13697400]
14:12:45 INFO - PROCESS | 2300 | 1478643165585 Marionette TRACE conn4 <- [1,31,null,{"value":["/XMLHttpRequest/abort-during-done.htm",0,null,null,[["XMLHttpRequest: abort() during DONE",0,null,null]]]}]
14:12:45 INFO - .
14:12:45 INFO - TEST-OK | /XMLHttpRequest/abort-during-done.htm | took 641ms
14:12:45 INFO - PROCESS | 2300 | 1478643165651 Marionette TRACE conn4 -> [0,32,"getWindowHandle",null]
14:12:45 INFO - PROCESS | 2300 | 1478643165656 Marionette TRACE conn4 <- [1,32,null,{"value":"13"}]
14:12:45 INFO - PROCESS | 2300 | 1478643165661 Marionette TRACE conn4 -> [0,33,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:45 INFO - TEST-START | /XMLHttpRequest/abort-during-open.htm
14:12:45 INFO - PROCESS | 2300 | 1478643165772 Marionette TRACE conn4 <- [1,33,null,{"value":null}]
14:12:45 INFO - PROCESS | 2300 | 1478643165828 Marionette TRACE conn4 -> [0,34,"getWindowHandles",null]
14:12:45 INFO - PROCESS | 2300 | 1478643165831 Marionette TRACE conn4 <- [1,34,null,["13"]]
14:12:45 INFO - PROCESS | 2300 | 1478643165834 Marionette TRACE conn4 -> [0,35,"switchToWindow",{"name":"13"}]
14:12:45 INFO - PROCESS | 2300 | 1478643165839 Marionette TRACE conn4 <- [1,35,null,{}]
14:12:45 INFO - PROCESS | 2300 | 1478643165843 Marionette TRACE conn4 -> [0,36,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:45 INFO - PROCESS | 2300 | ++DOCSHELL 14185400 == 12 [pid = 2300] [id = 16]
14:12:45 INFO - PROCESS | 2300 | ++DOMWINDOW == 26 (14185C00) [pid = 2300] [serial = 44] [outer = 00000000]
14:12:45 INFO - PROCESS | 2300 | ++DOMWINDOW == 27 (145C6800) [pid = 2300] [serial = 45] [outer = 14185C00]
14:12:45 INFO - PROCESS | 2300 | 1478643165914 Marionette DEBUG loaded listener.js
14:12:46 INFO - PROCESS | 2300 | ++DOMWINDOW == 28 (145D3800) [pid = 2300] [serial = 46] [outer = 14185C00]
14:12:46 INFO - PROCESS | 2300 | ++DOMWINDOW == 29 (143D8000) [pid = 2300] [serial = 47] [outer = 0EFF0000]
14:12:46 INFO - PROCESS | 2300 | 1478643166343 Marionette TRACE conn4 <- [1,36,null,{"value":["/XMLHttpRequest/abort-during-open.htm",0,null,null,[["XMLHttpRequest: abort() during OPEN",0,null,null]]]}]
14:12:46 INFO - .
14:12:46 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.htm | took 734ms
14:12:46 INFO - PROCESS | 2300 | 1478643166401 Marionette TRACE conn4 -> [0,37,"getWindowHandle",null]
14:12:46 INFO - PROCESS | 2300 | 1478643166404 Marionette TRACE conn4 <- [1,37,null,{"value":"13"}]
14:12:46 INFO - TEST-START | /XMLHttpRequest/abort-during-open.worker
14:12:46 INFO - PROCESS | 2300 | 1478643166412 Marionette TRACE conn4 -> [0,38,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:46 INFO - PROCESS | 2300 | 1478643166509 Marionette TRACE conn4 <- [1,38,null,{"value":null}]
14:12:46 INFO - PROCESS | 2300 | 1478643166515 Marionette TRACE conn4 -> [0,39,"getWindowHandles",null]
14:12:46 INFO - PROCESS | 2300 | 1478643166517 Marionette TRACE conn4 <- [1,39,null,["13"]]
14:12:46 INFO - PROCESS | 2300 | 1478643166521 Marionette TRACE conn4 -> [0,40,"switchToWindow",{"name":"13"}]
14:12:46 INFO - PROCESS | 2300 | 1478643166525 Marionette TRACE conn4 <- [1,40,null,{}]
14:12:46 INFO - PROCESS | 2300 | 1478643166530 Marionette TRACE conn4 -> [0,41,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:46 INFO - PROCESS | 2300 | ++DOCSHELL 13E70C00 == 13 [pid = 2300] [id = 17]
14:12:46 INFO - PROCESS | 2300 | ++DOMWINDOW == 30 (145D1400) [pid = 2300] [serial = 48] [outer = 00000000]
14:12:46 INFO - PROCESS | 2300 | ++DOMWINDOW == 31 (16AAFC00) [pid = 2300] [serial = 49] [outer = 145D1400]
14:12:46 INFO - PROCESS | 2300 | 1478643166596 Marionette DEBUG loaded listener.js
14:12:46 INFO - PROCESS | 2300 | ++DOMWINDOW == 32 (16AB7800) [pid = 2300] [serial = 50] [outer = 145D1400]
14:12:46 INFO - PROCESS | 2300 | [2300] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
14:12:47 INFO - PROCESS | 2300 | 1478643167036 Marionette TRACE conn4 <- [1,41,null,{"value":["/XMLHttpRequest/abort-during-open.worker",0,null,null,[["Untitled",0,{},{}]]]}]
14:12:47 INFO - .
14:12:47 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.worker | took 672ms
14:12:47 INFO - PROCESS | 2300 | 1478643167096 Marionette TRACE conn4 -> [0,42,"getWindowHandle",null]
14:12:47 INFO - PROCESS | 2300 | 1478643167098 Marionette TRACE conn4 <- [1,42,null,{"value":"13"}]
14:12:47 INFO - TEST-START | /XMLHttpRequest/abort-during-unsent.htm
14:12:47 INFO - PROCESS | 2300 | 1478643167103 Marionette TRACE conn4 -> [0,43,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:47 INFO - PROCESS | 2300 | 1478643167195 Marionette TRACE conn4 <- [1,43,null,{"value":null}]
14:12:47 INFO - PROCESS | 2300 | 1478643167202 Marionette TRACE conn4 -> [0,44,"getWindowHandles",null]
14:12:47 INFO - PROCESS | 2300 | 1478643167204 Marionette TRACE conn4 <- [1,44,null,["13"]]
14:12:47 INFO - PROCESS | 2300 | 1478643167207 Marionette TRACE conn4 -> [0,45,"switchToWindow",{"name":"13"}]
14:12:47 INFO - PROCESS | 2300 | 1478643167211 Marionette TRACE conn4 <- [1,45,null,{}]
14:12:47 INFO - PROCESS | 2300 | 1478643167215 Marionette TRACE conn4 -> [0,46,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-unsent.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:47 INFO - PROCESS | 2300 | ++DOCSHELL 16C89800 == 14 [pid = 2300] [id = 18]
14:12:47 INFO - PROCESS | 2300 | ++DOMWINDOW == 33 (16C89C00) [pid = 2300] [serial = 51] [outer = 00000000]
14:12:47 INFO - PROCESS | 2300 | ++DOMWINDOW == 34 (16E43C00) [pid = 2300] [serial = 52] [outer = 16C89C00]
14:12:47 INFO - PROCESS | 2300 | 1478643167277 Marionette DEBUG loaded listener.js
14:12:47 INFO - PROCESS | 2300 | ++DOMWINDOW == 35 (16E48C00) [pid = 2300] [serial = 53] [outer = 16C89C00]
14:12:47 INFO - PROCESS | 2300 | 1478643167621 Marionette TRACE conn4 <- [1,46,null,{"value":["/XMLHttpRequest/abort-during-unsent.htm",0,null,null,[["XMLHttpRequest: abort() during UNSENT",0,null,null]]]}]
14:12:47 INFO - .
14:12:47 INFO - TEST-OK | /XMLHttpRequest/abort-during-unsent.htm | took 532ms
14:12:47 INFO - PROCESS | 2300 | 1478643167637 Marionette TRACE conn4 -> [0,47,"getWindowHandle",null]
14:12:47 INFO - PROCESS | 2300 | 1478643167639 Marionette TRACE conn4 <- [1,47,null,{"value":"13"}]
14:12:47 INFO - TEST-START | /XMLHttpRequest/abort-during-upload.htm
14:12:47 INFO - PROCESS | 2300 | 1478643167644 Marionette TRACE conn4 -> [0,48,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:47 INFO - PROCESS | 2300 | 1478643167796 Marionette TRACE conn4 <- [1,48,null,{"value":null}]
14:12:47 INFO - PROCESS | 2300 | 1478643167804 Marionette TRACE conn4 -> [0,49,"getWindowHandles",null]
14:12:47 INFO - PROCESS | 2300 | 1478643167806 Marionette TRACE conn4 <- [1,49,null,["13"]]
14:12:47 INFO - PROCESS | 2300 | 1478643167810 Marionette TRACE conn4 -> [0,50,"switchToWindow",{"name":"13"}]
14:12:47 INFO - PROCESS | 2300 | 1478643167813 Marionette TRACE conn4 <- [1,50,null,{}]
14:12:47 INFO - PROCESS | 2300 | 1478643167816 Marionette TRACE conn4 -> [0,51,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-upload.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:47 INFO - PROCESS | 2300 | ++DOCSHELL 17203000 == 15 [pid = 2300] [id = 19]
14:12:47 INFO - PROCESS | 2300 | ++DOMWINDOW == 36 (17208800) [pid = 2300] [serial = 54] [outer = 00000000]
14:12:47 INFO - PROCESS | 2300 | ++DOMWINDOW == 37 (1764B800) [pid = 2300] [serial = 55] [outer = 17208800]
14:12:47 INFO - PROCESS | 2300 | 1478643167878 Marionette DEBUG loaded listener.js
14:12:47 INFO - PROCESS | 2300 | ++DOMWINDOW == 38 (17F3A800) [pid = 2300] [serial = 56] [outer = 17208800]
14:12:48 INFO - PROCESS | 2300 | 1478643168239 Marionette TRACE conn4 <- [1,51,null,{"value":["/XMLHttpRequest/abort-during-upload.htm",0,null,null,[["XMLHttpRequest: abort() while sending data",0,null,null]]]}]
14:12:48 INFO - .
14:12:48 INFO - TEST-OK | /XMLHttpRequest/abort-during-upload.htm | took 625ms
14:12:48 INFO - TEST-START | /XMLHttpRequest/abort-event-abort.htm
14:12:48 INFO - PROCESS | 2300 | 1478643168280 Marionette TRACE conn4 -> [0,52,"getWindowHandle",null]
14:12:48 INFO - PROCESS | 2300 | 1478643168282 Marionette TRACE conn4 <- [1,52,null,{"value":"13"}]
14:12:48 INFO - PROCESS | 2300 | 1478643168287 Marionette TRACE conn4 -> [0,53,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:48 INFO - PROCESS | 2300 | 1478643168401 Marionette TRACE conn4 <- [1,53,null,{"value":null}]
14:12:48 INFO - PROCESS | 2300 | 1478643168409 Marionette TRACE conn4 -> [0,54,"getWindowHandles",null]
14:12:48 INFO - PROCESS | 2300 | 1478643168411 Marionette TRACE conn4 <- [1,54,null,["13"]]
14:12:48 INFO - PROCESS | 2300 | 1478643168415 Marionette TRACE conn4 -> [0,55,"switchToWindow",{"name":"13"}]
14:12:48 INFO - PROCESS | 2300 | 1478643168418 Marionette TRACE conn4 <- [1,55,null,{}]
14:12:48 INFO - PROCESS | 2300 | 1478643168421 Marionette TRACE conn4 -> [0,56,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:48 INFO - PROCESS | 2300 | ++DOCSHELL 16AB1800 == 16 [pid = 2300] [id = 20]
14:12:48 INFO - PROCESS | 2300 | ++DOMWINDOW == 39 (17728C00) [pid = 2300] [serial = 57] [outer = 00000000]
14:12:48 INFO - PROCESS | 2300 | ++DOMWINDOW == 40 (18197000) [pid = 2300] [serial = 58] [outer = 17728C00]
14:12:48 INFO - PROCESS | 2300 | 1478643168483 Marionette DEBUG loaded listener.js
14:12:48 INFO - PROCESS | 2300 | ++DOMWINDOW == 41 (1819C800) [pid = 2300] [serial = 59] [outer = 17728C00]
14:12:48 INFO - PROCESS | 2300 | 1478643168802 Marionette TRACE conn4 <- [1,56,null,{"value":["/XMLHttpRequest/abort-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: do not fire abort event in OPENED state when send() flag is unset. send() throws after abort().",0,null,null]]]}]
14:12:48 INFO - .
14:12:48 INFO - TEST-OK | /XMLHttpRequest/abort-event-abort.htm | took 531ms
14:12:48 INFO - PROCESS | 2300 | 1478643168821 Marionette TRACE conn4 -> [0,57,"getWindowHandle",null]
14:12:48 INFO - PROCESS | 2300 | 1478643168823 Marionette TRACE conn4 <- [1,57,null,{"value":"13"}]
14:12:48 INFO - TEST-START | /XMLHttpRequest/abort-event-listeners.htm
14:12:48 INFO - PROCESS | 2300 | 1478643168828 Marionette TRACE conn4 -> [0,58,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:48 INFO - PROCESS | 2300 | 1478643168915 Marionette TRACE conn4 <- [1,58,null,{"value":null}]
14:12:48 INFO - PROCESS | 2300 | 1478643168921 Marionette TRACE conn4 -> [0,59,"getWindowHandles",null]
14:12:48 INFO - PROCESS | 2300 | 1478643168923 Marionette TRACE conn4 <- [1,59,null,["13"]]
14:12:48 INFO - PROCESS | 2300 | 1478643168927 Marionette TRACE conn4 -> [0,60,"switchToWindow",{"name":"13"}]
14:12:48 INFO - PROCESS | 2300 | 1478643168930 Marionette TRACE conn4 <- [1,60,null,{}]
14:12:48 INFO - PROCESS | 2300 | 1478643168933 Marionette TRACE conn4 -> [0,61,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-listeners.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:48 INFO - PROCESS | 2300 | ++DOCSHELL 12939800 == 17 [pid = 2300] [id = 21]
14:12:48 INFO - PROCESS | 2300 | ++DOMWINDOW == 42 (18637000) [pid = 2300] [serial = 60] [outer = 00000000]
14:12:48 INFO - PROCESS | 2300 | ++DOMWINDOW == 43 (18932000) [pid = 2300] [serial = 61] [outer = 18637000]
14:12:48 INFO - PROCESS | 2300 | 1478643168998 Marionette DEBUG loaded listener.js
14:12:49 INFO - PROCESS | 2300 | ++DOMWINDOW == 44 (18934800) [pid = 2300] [serial = 62] [outer = 18637000]
14:12:49 INFO - PROCESS | 2300 | 1478643169347 Marionette TRACE conn4 <- [1,61,null,{"value":["/XMLHttpRequest/abort-event-listeners.htm",0,null,null,[["XMLHttpRequest: abort() should not reset event listeners",0,null,null]]]}]
14:12:49 INFO - .
14:12:49 INFO - TEST-OK | /XMLHttpRequest/abort-event-listeners.htm | took 531ms
14:12:49 INFO - PROCESS | 2300 | 1478643169362 Marionette TRACE conn4 -> [0,62,"getWindowHandle",null]
14:12:49 INFO - PROCESS | 2300 | 1478643169364 Marionette TRACE conn4 <- [1,62,null,{"value":"13"}]
14:12:49 INFO - TEST-START | /XMLHttpRequest/abort-event-loadend.htm
14:12:49 INFO - PROCESS | 2300 | 1478643169369 Marionette TRACE conn4 -> [0,63,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:49 INFO - PROCESS | 2300 | 1478643169458 Marionette TRACE conn4 <- [1,63,null,{"value":null}]
14:12:49 INFO - PROCESS | 2300 | 1478643169463 Marionette TRACE conn4 -> [0,64,"getWindowHandles",null]
14:12:49 INFO - PROCESS | 2300 | 1478643169465 Marionette TRACE conn4 <- [1,64,null,["13"]]
14:12:49 INFO - PROCESS | 2300 | 1478643169468 Marionette TRACE conn4 -> [0,65,"switchToWindow",{"name":"13"}]
14:12:49 INFO - PROCESS | 2300 | 1478643169472 Marionette TRACE conn4 <- [1,65,null,{}]
14:12:49 INFO - PROCESS | 2300 | 1478643169475 Marionette TRACE conn4 -> [0,66,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:49 INFO - PROCESS | 2300 | ++DOCSHELL 16AAD400 == 18 [pid = 2300] [id = 22]
14:12:49 INFO - PROCESS | 2300 | ++DOMWINDOW == 45 (189B7800) [pid = 2300] [serial = 63] [outer = 00000000]
14:12:49 INFO - PROCESS | 2300 | ++DOMWINDOW == 46 (189C4800) [pid = 2300] [serial = 64] [outer = 189B7800]
14:12:49 INFO - PROCESS | 2300 | 1478643169595 Marionette DEBUG loaded listener.js
14:12:49 INFO - PROCESS | 2300 | ++DOMWINDOW == 47 (18AC4000) [pid = 2300] [serial = 65] [outer = 189B7800]
14:12:49 INFO - PROCESS | 2300 | 1478643169899 Marionette TRACE conn4 <- [1,66,null,{"value":["/XMLHttpRequest/abort-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend",0,null,null]]]}]
14:12:49 INFO - .
14:12:49 INFO - TEST-OK | /XMLHttpRequest/abort-event-loadend.htm | took 594ms
14:12:49 INFO - TEST-START | /XMLHttpRequest/abort-event-order.htm
14:12:49 INFO - PROCESS | 2300 | 1478643169965 Marionette TRACE conn4 -> [0,67,"getWindowHandle",null]
14:12:49 INFO - PROCESS | 2300 | 1478643169967 Marionette TRACE conn4 <- [1,67,null,{"value":"13"}]
14:12:49 INFO - PROCESS | 2300 | 1478643169971 Marionette TRACE conn4 -> [0,68,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:50 INFO - PROCESS | 2300 | 1478643170064 Marionette TRACE conn4 <- [1,68,null,{"value":null}]
14:12:50 INFO - PROCESS | 2300 | 1478643170122 Marionette TRACE conn4 -> [0,69,"getWindowHandles",null]
14:12:50 INFO - PROCESS | 2300 | 1478643170124 Marionette TRACE conn4 <- [1,69,null,["13"]]
14:12:50 INFO - PROCESS | 2300 | 1478643170128 Marionette TRACE conn4 -> [0,70,"switchToWindow",{"name":"13"}]
14:12:50 INFO - PROCESS | 2300 | 1478643170131 Marionette TRACE conn4 <- [1,70,null,{}]
14:12:50 INFO - PROCESS | 2300 | 1478643170135 Marionette TRACE conn4 -> [0,71,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:50 INFO - PROCESS | 2300 | ++DOCSHELL 189BC400 == 19 [pid = 2300] [id = 23]
14:12:50 INFO - PROCESS | 2300 | ++DOMWINDOW == 48 (18AC4C00) [pid = 2300] [serial = 66] [outer = 00000000]
14:12:50 INFO - PROCESS | 2300 | ++DOMWINDOW == 49 (192AF400) [pid = 2300] [serial = 67] [outer = 18AC4C00]
14:12:50 INFO - PROCESS | 2300 | 1478643170196 Marionette DEBUG loaded listener.js
14:12:50 INFO - PROCESS | 2300 | ++DOMWINDOW == 50 (192B8800) [pid = 2300] [serial = 68] [outer = 18AC4C00]
14:12:50 INFO - PROCESS | 2300 | 1478643170495 Marionette TRACE conn4 <- [1,71,null,{"value":["/XMLHttpRequest/abort-event-order.htm",0,null,null,[["XMLHttpRequest: The abort() method: abort and loadend events",0,null,null]]]}]
14:12:50 INFO - .
14:12:50 INFO - TEST-OK | /XMLHttpRequest/abort-event-order.htm | took 563ms
14:12:50 INFO - PROCESS | 2300 | 1478643170547 Marionette TRACE conn4 -> [0,72,"getWindowHandle",null]
14:12:50 INFO - PROCESS | 2300 | 1478643170549 Marionette TRACE conn4 <- [1,72,null,{"value":"13"}]
14:12:50 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-abort.htm
14:12:50 INFO - PROCESS | 2300 | 1478643170554 Marionette TRACE conn4 -> [0,73,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:50 INFO - PROCESS | 2300 | 1478643170684 Marionette TRACE conn4 <- [1,73,null,{"value":null}]
14:12:50 INFO - PROCESS | 2300 | 1478643170690 Marionette TRACE conn4 -> [0,74,"getWindowHandles",null]
14:12:50 INFO - PROCESS | 2300 | 1478643170692 Marionette TRACE conn4 <- [1,74,null,["13"]]
14:12:50 INFO - PROCESS | 2300 | 1478643170696 Marionette TRACE conn4 -> [0,75,"switchToWindow",{"name":"13"}]
14:12:50 INFO - PROCESS | 2300 | 1478643170701 Marionette TRACE conn4 <- [1,75,null,{}]
14:12:50 INFO - PROCESS | 2300 | 1478643170704 Marionette TRACE conn4 -> [0,76,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:50 INFO - PROCESS | 2300 | ++DOCSHELL 196D3C00 == 20 [pid = 2300] [id = 24]
14:12:50 INFO - PROCESS | 2300 | ++DOMWINDOW == 51 (196DEC00) [pid = 2300] [serial = 69] [outer = 00000000]
14:12:50 INFO - PROCESS | 2300 | ++DOMWINDOW == 52 (196EEC00) [pid = 2300] [serial = 70] [outer = 196DEC00]
14:12:50 INFO - PROCESS | 2300 | 1478643170774 Marionette DEBUG loaded listener.js
14:12:50 INFO - PROCESS | 2300 | ++DOMWINDOW == 53 (198C6C00) [pid = 2300] [serial = 71] [outer = 196DEC00]
14:12:51 INFO - PROCESS | 2300 | 1478643171126 Marionette TRACE conn4 <- [1,76,null,{"value":["/XMLHttpRequest/abort-upload-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named abort on the XMLHttpRequestUpload object",0,null,null]]]}]
14:12:51 INFO - .
14:12:51 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-abort.htm | took 625ms
14:12:51 INFO - PROCESS | 2300 | 1478643171190 Marionette TRACE conn4 -> [0,77,"getWindowHandle",null]
14:12:51 INFO - PROCESS | 2300 | 1478643171193 Marionette TRACE conn4 <- [1,77,null,{"value":"13"}]
14:12:51 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-loadend.htm
14:12:51 INFO - PROCESS | 2300 | 1478643171197 Marionette TRACE conn4 -> [0,78,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:51 INFO - PROCESS | 2300 | 1478643171291 Marionette TRACE conn4 <- [1,78,null,{"value":null}]
14:12:51 INFO - PROCESS | 2300 | 1478643171296 Marionette TRACE conn4 -> [0,79,"getWindowHandles",null]
14:12:51 INFO - PROCESS | 2300 | 1478643171298 Marionette TRACE conn4 <- [1,79,null,["13"]]
14:12:51 INFO - PROCESS | 2300 | 1478643171301 Marionette TRACE conn4 -> [0,80,"switchToWindow",{"name":"13"}]
14:12:51 INFO - PROCESS | 2300 | 1478643171304 Marionette TRACE conn4 <- [1,80,null,{}]
14:12:51 INFO - PROCESS | 2300 | 1478643171308 Marionette TRACE conn4 -> [0,81,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:51 INFO - PROCESS | 2300 | ++DOCSHELL 19934000 == 21 [pid = 2300] [id = 25]
14:12:51 INFO - PROCESS | 2300 | ++DOMWINDOW == 54 (19937C00) [pid = 2300] [serial = 72] [outer = 00000000]
14:12:51 INFO - PROCESS | 2300 | ++DOMWINDOW == 55 (1A0EBC00) [pid = 2300] [serial = 73] [outer = 19937C00]
14:12:51 INFO - PROCESS | 2300 | 1478643171368 Marionette DEBUG loaded listener.js
14:12:51 INFO - PROCESS | 2300 | ++DOMWINDOW == 56 (1A0EFC00) [pid = 2300] [serial = 74] [outer = 19937C00]
14:12:51 INFO - PROCESS | 2300 | 1478643171704 Marionette TRACE conn4 <- [1,81,null,{"value":["/XMLHttpRequest/abort-upload-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend on the XMLHttpRequestUpload object",0,null,null]]]}]
14:12:51 INFO - .
14:12:51 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-loadend.htm | took 531ms
14:12:51 INFO - PROCESS | 2300 | 1478643171732 Marionette TRACE conn4 -> [0,82,"getWindowHandle",null]
14:12:51 INFO - PROCESS | 2300 | 1478643171734 Marionette TRACE conn4 <- [1,82,null,{"value":"13"}]
14:12:51 INFO - TEST-START | /XMLHttpRequest/anonymous-mode-unsupported.htm
14:12:51 INFO - PROCESS | 2300 | 1478643171738 Marionette TRACE conn4 -> [0,83,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:51 INFO - PROCESS | 2300 | 1478643171857 Marionette TRACE conn4 <- [1,83,null,{"value":null}]
14:12:51 INFO - PROCESS | 2300 | 1478643171864 Marionette TRACE conn4 -> [0,84,"getWindowHandles",null]
14:12:51 INFO - PROCESS | 2300 | 1478643171866 Marionette TRACE conn4 <- [1,84,null,["13"]]
14:12:51 INFO - PROCESS | 2300 | 1478643171869 Marionette TRACE conn4 -> [0,85,"switchToWindow",{"name":"13"}]
14:12:51 INFO - PROCESS | 2300 | 1478643171872 Marionette TRACE conn4 <- [1,85,null,{}]
14:12:51 INFO - PROCESS | 2300 | 1478643171877 Marionette TRACE conn4 -> [0,86,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/anonymous-mode-unsupported.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:51 INFO - PROCESS | 2300 | ++DOCSHELL 192B5800 == 22 [pid = 2300] [id = 26]
14:12:51 INFO - PROCESS | 2300 | ++DOMWINDOW == 57 (19A5D000) [pid = 2300] [serial = 75] [outer = 00000000]
14:12:51 INFO - PROCESS | 2300 | ++DOMWINDOW == 58 (1A0F6400) [pid = 2300] [serial = 76] [outer = 19A5D000]
14:12:51 INFO - PROCESS | 2300 | 1478643171937 Marionette DEBUG loaded listener.js
14:12:52 INFO - PROCESS | 2300 | ++DOMWINDOW == 59 (1A363000) [pid = 2300] [serial = 77] [outer = 19A5D000]
14:12:52 INFO - PROCESS | 2300 | 1478643172347 Marionette TRACE conn4 <- [1,86,null,{"value":["/XMLHttpRequest/anonymous-mode-unsupported.htm",0,null,null,[["XMLHttpRequest: anonymous mode unsupported",0,null,null]]]}]
14:12:52 INFO - .
14:12:52 INFO - TEST-OK | /XMLHttpRequest/anonymous-mode-unsupported.htm | took 625ms
14:12:52 INFO - PROCESS | 2300 | 1478643172376 Marionette TRACE conn4 -> [0,87,"getWindowHandle",null]
14:12:52 INFO - PROCESS | 2300 | 1478643172381 Marionette TRACE conn4 <- [1,87,null,{"value":"13"}]
14:12:52 INFO - TEST-START | /XMLHttpRequest/data-uri.htm
14:12:52 INFO - PROCESS | 2300 | 1478643172389 Marionette TRACE conn4 -> [0,88,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:52 INFO - PROCESS | 2300 | 1478643172550 Marionette TRACE conn4 <- [1,88,null,{"value":null}]
14:12:52 INFO - PROCESS | 2300 | 1478643172614 Marionette TRACE conn4 -> [0,89,"getWindowHandles",null]
14:12:52 INFO - PROCESS | 2300 | 1478643172618 Marionette TRACE conn4 <- [1,89,null,["13"]]
14:12:52 INFO - PROCESS | 2300 | 1478643172665 Marionette TRACE conn4 -> [0,90,"switchToWindow",{"name":"13"}]
14:12:52 INFO - PROCESS | 2300 | 1478643172672 Marionette TRACE conn4 <- [1,90,null,{}]
14:12:52 INFO - PROCESS | 2300 | 1478643172676 Marionette TRACE conn4 -> [0,91,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/data-uri.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/data-uri.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:52 INFO - PROCESS | 2300 | ++DOCSHELL 1293A400 == 23 [pid = 2300] [id = 27]
14:12:52 INFO - PROCESS | 2300 | ++DOMWINDOW == 60 (12941C00) [pid = 2300] [serial = 78] [outer = 00000000]
14:12:52 INFO - PROCESS | 2300 | ++DOMWINDOW == 61 (13C7E800) [pid = 2300] [serial = 79] [outer = 12941C00]
14:12:52 INFO - PROCESS | 2300 | 1478643172766 Marionette DEBUG loaded listener.js
14:12:52 INFO - PROCESS | 2300 | ++DOMWINDOW == 62 (13E78400) [pid = 2300] [serial = 80] [outer = 12941C00]
14:12:53 INFO - PROCESS | 2300 | 1478643173258 Marionette TRACE conn4 <- [1,91,null,{"value":["/XMLHttpRequest/data-uri.htm",0,null,null,[["XHR method GET with charset text/plain",0,null,null],["XHR method GET with charset text/plain (base64)",0,null,null],["XHR method GET with charset text/html",0,null,null],["XHR method GET with charset text/html;charset=UTF-8",0,null,null],["XHR method GET with charset image/png",1,"assert_equals: expected \"Hello, World!\" but got \"Hello,World!\"","do_test/ [0,92,"getWindowHandle",null]
14:12:53 INFO - PROCESS | 2300 | 1478643173376 Marionette TRACE conn4 <- [1,92,null,{"value":"13"}]
14:12:53 INFO - TEST-START | /XMLHttpRequest/event-abort.htm
14:12:53 INFO - PROCESS | 2300 | 1478643173385 Marionette TRACE conn4 -> [0,93,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:53 INFO - PROCESS | 2300 | 1478643173555 Marionette TRACE conn4 <- [1,93,null,{"value":null}]
14:12:53 INFO - PROCESS | 2300 | 1478643173630 Marionette TRACE conn4 -> [0,94,"getWindowHandles",null]
14:12:53 INFO - PROCESS | 2300 | 1478643173633 Marionette TRACE conn4 <- [1,94,null,["13"]]
14:12:53 INFO - PROCESS | 2300 | 1478643173637 Marionette TRACE conn4 -> [0,95,"switchToWindow",{"name":"13"}]
14:12:53 INFO - PROCESS | 2300 | 1478643173642 Marionette TRACE conn4 <- [1,95,null,{}]
14:12:53 INFO - PROCESS | 2300 | 1478643173647 Marionette TRACE conn4 -> [0,96,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-abort.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:53 INFO - PROCESS | 2300 | ++DOCSHELL 17F47800 == 24 [pid = 2300] [id = 28]
14:12:53 INFO - PROCESS | 2300 | ++DOMWINDOW == 63 (17F47C00) [pid = 2300] [serial = 81] [outer = 00000000]
14:12:53 INFO - PROCESS | 2300 | ++DOMWINDOW == 64 (18196400) [pid = 2300] [serial = 82] [outer = 17F47C00]
14:12:53 INFO - PROCESS | 2300 | 1478643173731 Marionette DEBUG loaded listener.js
14:12:53 INFO - PROCESS | 2300 | ++DOMWINDOW == 65 (18931400) [pid = 2300] [serial = 83] [outer = 17F47C00]
14:12:54 INFO - PROCESS | 2300 | 1478643174180 Marionette TRACE conn4 <- [1,96,null,{"value":["/XMLHttpRequest/event-abort.htm",0,null,null,[["XMLHttpRequest: abort event",0,null,null]]]}]
14:12:54 INFO - .
14:12:54 INFO - TEST-OK | /XMLHttpRequest/event-abort.htm | took 844ms
14:12:54 INFO - PROCESS | 2300 | 1478643174236 Marionette TRACE conn4 -> [0,97,"getWindowHandle",null]
14:12:54 INFO - PROCESS | 2300 | 1478643174242 Marionette TRACE conn4 <- [1,97,null,{"value":"13"}]
14:12:54 INFO - TEST-START | /XMLHttpRequest/event-error-order.sub.html
14:12:54 INFO - PROCESS | 2300 | 1478643174247 Marionette TRACE conn4 -> [0,98,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:54 INFO - PROCESS | 2300 | 1478643174364 Marionette TRACE conn4 <- [1,98,null,{"value":null}]
14:12:54 INFO - PROCESS | 2300 | 1478643174442 Marionette TRACE conn4 -> [0,99,"getWindowHandles",null]
14:12:54 INFO - PROCESS | 2300 | 1478643174445 Marionette TRACE conn4 <- [1,99,null,["13"]]
14:12:54 INFO - PROCESS | 2300 | 1478643174449 Marionette TRACE conn4 -> [0,100,"switchToWindow",{"name":"13"}]
14:12:54 INFO - PROCESS | 2300 | 1478643174454 Marionette TRACE conn4 <- [1,100,null,{}]
14:12:54 INFO - PROCESS | 2300 | 1478643174458 Marionette TRACE conn4 -> [0,101,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error-order.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:54 INFO - PROCESS | 2300 | ++DOCSHELL 196ED000 == 25 [pid = 2300] [id = 29]
14:12:54 INFO - PROCESS | 2300 | ++DOMWINDOW == 66 (196ED400) [pid = 2300] [serial = 84] [outer = 00000000]
14:12:54 INFO - PROCESS | 2300 | ++DOMWINDOW == 67 (1A0EB000) [pid = 2300] [serial = 85] [outer = 196ED400]
14:12:54 INFO - PROCESS | 2300 | 1478643174539 Marionette DEBUG loaded listener.js
14:12:54 INFO - PROCESS | 2300 | ++DOMWINDOW == 68 (1A0F6000) [pid = 2300] [serial = 86] [outer = 196ED400]
14:12:54 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
14:12:54 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 1293
14:12:54 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
14:12:54 INFO - PROCESS | 2300 | 1478643174953 Marionette TRACE conn4 <- [1,101,null,{"value":["/XMLHttpRequest/event-error-order.sub.html",0,null,null,[["XMLHttpRequest: event - error (order of events)",0,null,null]]]}]
14:12:54 INFO - .
14:12:54 INFO - TEST-OK | /XMLHttpRequest/event-error-order.sub.html | took 735ms
14:12:54 INFO - PROCESS | 2300 | 1478643174987 Marionette TRACE conn4 -> [0,102,"getWindowHandle",null]
14:12:54 INFO - PROCESS | 2300 | 1478643174991 Marionette TRACE conn4 <- [1,102,null,{"value":"13"}]
14:12:54 INFO - TEST-START | /XMLHttpRequest/event-error.sub.html
14:12:54 INFO - PROCESS | 2300 | 1478643174996 Marionette TRACE conn4 -> [0,103,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:55 INFO - PROCESS | 2300 | 1478643175122 Marionette TRACE conn4 <- [1,103,null,{"value":null}]
14:12:55 INFO - PROCESS | 2300 | 1478643175186 Marionette TRACE conn4 -> [0,104,"getWindowHandles",null]
14:12:55 INFO - PROCESS | 2300 | 1478643175189 Marionette TRACE conn4 <- [1,104,null,["13"]]
14:12:55 INFO - PROCESS | 2300 | 1478643175193 Marionette TRACE conn4 -> [0,105,"switchToWindow",{"name":"13"}]
14:12:55 INFO - PROCESS | 2300 | 1478643175197 Marionette TRACE conn4 <- [1,105,null,{}]
14:12:55 INFO - PROCESS | 2300 | 1478643175201 Marionette TRACE conn4 -> [0,106,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:55 INFO - PROCESS | 2300 | ++DOCSHELL 1A36F400 == 26 [pid = 2300] [id = 30]
14:12:55 INFO - PROCESS | 2300 | ++DOMWINDOW == 69 (1AD0D800) [pid = 2300] [serial = 87] [outer = 00000000]
14:12:55 INFO - PROCESS | 2300 | ++DOMWINDOW == 70 (1AD14000) [pid = 2300] [serial = 88] [outer = 1AD0D800]
14:12:55 INFO - PROCESS | 2300 | 1478643175308 Marionette DEBUG loaded listener.js
14:12:55 INFO - PROCESS | 2300 | ++DOMWINDOW == 71 (1ADA8C00) [pid = 2300] [serial = 89] [outer = 1AD0D800]
14:12:55 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
14:12:55 INFO - PROCESS | 2300 | 1478643175873 Marionette TRACE conn4 <- [1,106,null,{"value":["/XMLHttpRequest/event-error.sub.html",0,null,null,[["XMLHttpRequest Test: event - error",0,null,null]]]}]
14:12:55 INFO - .
14:12:55 INFO - TEST-OK | /XMLHttpRequest/event-error.sub.html | took 938ms
14:12:55 INFO - PROCESS | 2300 | 1478643175940 Marionette TRACE conn4 -> [0,107,"getWindowHandle",null]
14:12:55 INFO - PROCESS | 2300 | 1478643175945 Marionette TRACE conn4 <- [1,107,null,{"value":"13"}]
14:12:55 INFO - TEST-START | /XMLHttpRequest/event-load.htm
14:12:56 INFO - PROCESS | 2300 | 1478643175999 Marionette TRACE conn4 -> [0,108,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:56 INFO - PROCESS | 2300 | 1478643176120 Marionette TRACE conn4 <- [1,108,null,{"value":null}]
14:12:56 INFO - PROCESS | 2300 | 1478643176229 Marionette TRACE conn4 -> [0,109,"getWindowHandles",null]
14:12:56 INFO - PROCESS | 2300 | 1478643176233 Marionette TRACE conn4 <- [1,109,null,["13"]]
14:12:56 INFO - PROCESS | 2300 | 1478643176240 Marionette TRACE conn4 -> [0,110,"switchToWindow",{"name":"13"}]
14:12:56 INFO - PROCESS | 2300 | 1478643176246 Marionette TRACE conn4 <- [1,110,null,{}]
14:12:56 INFO - PROCESS | 2300 | 1478643176250 Marionette TRACE conn4 -> [0,111,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-load.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-load.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:56 INFO - PROCESS | 2300 | ++DOCSHELL 12E0CC00 == 27 [pid = 2300] [id = 31]
14:12:56 INFO - PROCESS | 2300 | ++DOMWINDOW == 72 (12E0D400) [pid = 2300] [serial = 90] [outer = 00000000]
14:12:56 INFO - PROCESS | 2300 | ++DOMWINDOW == 73 (145CD800) [pid = 2300] [serial = 91] [outer = 12E0D400]
14:12:56 INFO - PROCESS | 2300 | 1478643176323 Marionette DEBUG loaded listener.js
14:12:56 INFO - PROCESS | 2300 | ++DOMWINDOW == 74 (149C2400) [pid = 2300] [serial = 92] [outer = 12E0D400]
14:12:56 INFO - PROCESS | 2300 | --DOCSHELL 1818E800 == 26 [pid = 2300] [id = 11]
14:12:56 INFO - PROCESS | 2300 | 1478643176778 Marionette TRACE conn4 <- [1,111,null,{"value":["/XMLHttpRequest/event-load.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire an event named load (synchronous flag is unset)",0,null,null]]]}]
14:12:56 INFO - .
14:12:56 INFO - TEST-OK | /XMLHttpRequest/event-load.htm | took 891ms
14:12:56 INFO - PROCESS | 2300 | 1478643176834 Marionette TRACE conn4 -> [0,112,"getWindowHandle",null]
14:12:56 INFO - PROCESS | 2300 | 1478643176837 Marionette TRACE conn4 <- [1,112,null,{"value":"13"}]
14:12:56 INFO - TEST-START | /XMLHttpRequest/event-loadend.htm
14:12:56 INFO - PROCESS | 2300 | 1478643176843 Marionette TRACE conn4 -> [0,113,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:56 INFO - PROCESS | 2300 | 1478643176945 Marionette TRACE conn4 <- [1,113,null,{"value":null}]
14:12:57 INFO - PROCESS | 2300 | 1478643177009 Marionette TRACE conn4 -> [0,114,"getWindowHandles",null]
14:12:57 INFO - PROCESS | 2300 | 1478643177012 Marionette TRACE conn4 <- [1,114,null,["13"]]
14:12:57 INFO - PROCESS | 2300 | 1478643177016 Marionette TRACE conn4 -> [0,115,"switchToWindow",{"name":"13"}]
14:12:57 INFO - PROCESS | 2300 | 1478643177020 Marionette TRACE conn4 <- [1,115,null,{}]
14:12:57 INFO - PROCESS | 2300 | 1478643177023 Marionette TRACE conn4 -> [0,116,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:57 INFO - PROCESS | 2300 | ++DOCSHELL 145D3C00 == 27 [pid = 2300] [id = 32]
14:12:57 INFO - PROCESS | 2300 | ++DOMWINDOW == 75 (147F5000) [pid = 2300] [serial = 93] [outer = 00000000]
14:12:57 INFO - PROCESS | 2300 | ++DOMWINDOW == 76 (16E4FC00) [pid = 2300] [serial = 94] [outer = 147F5000]
14:12:57 INFO - PROCESS | 2300 | 1478643177088 Marionette DEBUG loaded listener.js
14:12:57 INFO - PROCESS | 2300 | ++DOMWINDOW == 77 (1764B400) [pid = 2300] [serial = 95] [outer = 147F5000]
14:12:57 INFO - PROCESS | 2300 | 1478643177422 Marionette TRACE conn4 <- [1,116,null,{"value":["/XMLHttpRequest/event-loadend.htm",0,null,null,[["XMLHttpRequest: loadend event",0,null,null]]]}]
14:12:57 INFO - .
14:12:57 INFO - TEST-OK | /XMLHttpRequest/event-loadend.htm | took 641ms
14:12:57 INFO - PROCESS | 2300 | 1478643177484 Marionette TRACE conn4 -> [0,117,"getWindowHandle",null]
14:12:57 INFO - PROCESS | 2300 | 1478643177488 Marionette TRACE conn4 <- [1,117,null,{"value":"13"}]
14:12:57 INFO - PROCESS | 2300 | 1478643177493 Marionette TRACE conn4 -> [0,118,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:57 INFO - TEST-START | /XMLHttpRequest/event-loadstart.htm
14:12:57 INFO - PROCESS | 2300 | 1478643177595 Marionette TRACE conn4 <- [1,118,null,{"value":null}]
14:12:57 INFO - PROCESS | 2300 | 1478643177662 Marionette TRACE conn4 -> [0,119,"getWindowHandles",null]
14:12:57 INFO - PROCESS | 2300 | 1478643177665 Marionette TRACE conn4 <- [1,119,null,["13"]]
14:12:57 INFO - PROCESS | 2300 | 1478643177668 Marionette TRACE conn4 -> [0,120,"switchToWindow",{"name":"13"}]
14:12:57 INFO - PROCESS | 2300 | 1478643177672 Marionette TRACE conn4 <- [1,120,null,{}]
14:12:57 INFO - PROCESS | 2300 | 1478643177676 Marionette TRACE conn4 -> [0,121,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadstart.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:57 INFO - PROCESS | 2300 | ++DOCSHELL 18930000 == 28 [pid = 2300] [id = 33]
14:12:57 INFO - PROCESS | 2300 | ++DOMWINDOW == 78 (18930800) [pid = 2300] [serial = 96] [outer = 00000000]
14:12:57 INFO - PROCESS | 2300 | ++DOMWINDOW == 79 (18F13C00) [pid = 2300] [serial = 97] [outer = 18930800]
14:12:57 INFO - PROCESS | 2300 | 1478643177742 Marionette DEBUG loaded listener.js
14:12:57 INFO - PROCESS | 2300 | ++DOMWINDOW == 80 (1926A400) [pid = 2300] [serial = 98] [outer = 18930800]
14:12:58 INFO - PROCESS | 2300 | 1478643178053 Marionette TRACE conn4 <- [1,121,null,{"value":["/XMLHttpRequest/event-loadstart.htm",0,null,null,[["XMLHttpRequest: loadstart event",0,null,null]]]}]
14:12:58 INFO - .
14:12:58 INFO - TEST-OK | /XMLHttpRequest/event-loadstart.htm | took 578ms
14:12:58 INFO - PROCESS | 2300 | 1478643178070 Marionette TRACE conn4 -> [0,122,"getWindowHandle",null]
14:12:58 INFO - PROCESS | 2300 | 1478643178073 Marionette TRACE conn4 <- [1,122,null,{"value":"13"}]
14:12:58 INFO - TEST-START | /XMLHttpRequest/event-progress.htm
14:12:58 INFO - PROCESS | 2300 | 1478643178078 Marionette TRACE conn4 -> [0,123,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:12:58 INFO - PROCESS | 2300 | 1478643178208 Marionette TRACE conn4 <- [1,123,null,{"value":null}]
14:12:58 INFO - PROCESS | 2300 | 1478643178216 Marionette TRACE conn4 -> [0,124,"getWindowHandles",null]
14:12:58 INFO - PROCESS | 2300 | 1478643178218 Marionette TRACE conn4 <- [1,124,null,["13"]]
14:12:58 INFO - PROCESS | 2300 | 1478643178223 Marionette TRACE conn4 -> [0,125,"switchToWindow",{"name":"13"}]
14:12:58 INFO - PROCESS | 2300 | 1478643178227 Marionette TRACE conn4 <- [1,125,null,{}]
14:12:58 INFO - PROCESS | 2300 | 1478643178230 Marionette TRACE conn4 -> [0,126,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-progress.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:12:58 INFO - PROCESS | 2300 | ++DOCSHELL 196EA400 == 29 [pid = 2300] [id = 34]
14:12:58 INFO - PROCESS | 2300 | ++DOMWINDOW == 81 (1985A000) [pid = 2300] [serial = 99] [outer = 00000000]
14:12:58 INFO - PROCESS | 2300 | ++DOMWINDOW == 82 (19A6BC00) [pid = 2300] [serial = 100] [outer = 1985A000]
14:12:58 INFO - PROCESS | 2300 | 1478643178294 Marionette DEBUG loaded listener.js
14:12:58 INFO - PROCESS | 2300 | ++DOMWINDOW == 83 (1A362C00) [pid = 2300] [serial = 101] [outer = 1985A000]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 82 (19937C00) [pid = 2300] [serial = 72] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 81 (16C89C00) [pid = 2300] [serial = 51] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 80 (14185C00) [pid = 2300] [serial = 44] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 79 (17208800) [pid = 2300] [serial = 54] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 78 (17728C00) [pid = 2300] [serial = 57] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 77 (13697400) [pid = 2300] [serial = 41] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 76 (18637000) [pid = 2300] [serial = 60] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 75 (189B7800) [pid = 2300] [serial = 63] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 74 (18190400) [pid = 2300] [serial = 29] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 73 (18AC4C00) [pid = 2300] [serial = 66] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 72 (0FBF0000) [pid = 2300] [serial = 38] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 71 (145D1400) [pid = 2300] [serial = 48] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker]
14:13:00 INFO - PROCESS | 2300 | --DOMWINDOW == 70 (196DEC00) [pid = 2300] [serial = 69] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm]
14:13:01 INFO - PROCESS | 2300 | 1478643181611 Marionette TRACE conn4 <- [1,126,null,{"value":["/XMLHttpRequest/event-progress.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire a progress event named progress (synchronous flag is unset)",0,null,null]]]}]
14:13:01 INFO - .
14:13:01 INFO - TEST-OK | /XMLHttpRequest/event-progress.htm | took 3594ms
14:13:01 INFO - PROCESS | 2300 | 1478643181666 Marionette TRACE conn4 -> [0,127,"getWindowHandle",null]
14:13:01 INFO - PROCESS | 2300 | 1478643181668 Marionette TRACE conn4 <- [1,127,null,{"value":"13"}]
14:13:01 INFO - TEST-START | /XMLHttpRequest/event-readystate-sync-open.htm
14:13:01 INFO - PROCESS | 2300 | 1478643181673 Marionette TRACE conn4 -> [0,128,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:01 INFO - PROCESS | 2300 | 1478643181762 Marionette TRACE conn4 <- [1,128,null,{"value":null}]
14:13:01 INFO - PROCESS | 2300 | 1478643181768 Marionette TRACE conn4 -> [0,129,"getWindowHandles",null]
14:13:01 INFO - PROCESS | 2300 | 1478643181770 Marionette TRACE conn4 <- [1,129,null,["13"]]
14:13:01 INFO - PROCESS | 2300 | 1478643181774 Marionette TRACE conn4 -> [0,130,"switchToWindow",{"name":"13"}]
14:13:01 INFO - PROCESS | 2300 | 1478643181777 Marionette TRACE conn4 <- [1,130,null,{}]
14:13:01 INFO - PROCESS | 2300 | 1478643181781 Marionette TRACE conn4 -> [0,131,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystate-sync-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:01 INFO - PROCESS | 2300 | ++DOCSHELL 19937C00 == 30 [pid = 2300] [id = 35]
14:13:01 INFO - PROCESS | 2300 | ++DOMWINDOW == 71 (19A63400) [pid = 2300] [serial = 102] [outer = 00000000]
14:13:01 INFO - PROCESS | 2300 | ++DOMWINDOW == 72 (1AD11000) [pid = 2300] [serial = 103] [outer = 19A63400]
14:13:01 INFO - PROCESS | 2300 | 1478643181843 Marionette DEBUG loaded listener.js
14:13:01 INFO - PROCESS | 2300 | ++DOMWINDOW == 73 (1AD19C00) [pid = 2300] [serial = 104] [outer = 19A63400]
14:13:02 INFO - PROCESS | 2300 | 1478643182253 Marionette TRACE conn4 <- [1,131,null,{"value":["/XMLHttpRequest/event-readystate-sync-open.htm",0,null,null,[["XMLHttpRequest: open() call fires sync readystate event (sync)",0,null,null],["XMLHttpRequest: open() call fires sync readystate event (async)",0,null,null]]]}]
14:13:02 INFO - ..
14:13:02 INFO - TEST-OK | /XMLHttpRequest/event-readystate-sync-open.htm | took 641ms
14:13:02 INFO - TEST-START | /XMLHttpRequest/event-readystatechange-loaded.htm
14:13:02 INFO - PROCESS | 2300 | 1478643182327 Marionette TRACE conn4 -> [0,132,"getWindowHandle",null]
14:13:02 INFO - PROCESS | 2300 | 1478643182329 Marionette TRACE conn4 <- [1,132,null,{"value":"13"}]
14:13:02 INFO - PROCESS | 2300 | 1478643182340 Marionette TRACE conn4 -> [0,133,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:02 INFO - PROCESS | 2300 | 1478643182489 Marionette TRACE conn4 <- [1,133,null,{"value":null}]
14:13:02 INFO - PROCESS | 2300 | 1478643182497 Marionette TRACE conn4 -> [0,134,"getWindowHandles",null]
14:13:02 INFO - PROCESS | 2300 | 1478643182499 Marionette TRACE conn4 <- [1,134,null,["13"]]
14:13:02 INFO - PROCESS | 2300 | 1478643182502 Marionette TRACE conn4 -> [0,135,"switchToWindow",{"name":"13"}]
14:13:02 INFO - PROCESS | 2300 | 1478643182506 Marionette TRACE conn4 <- [1,135,null,{}]
14:13:02 INFO - PROCESS | 2300 | 1478643182509 Marionette TRACE conn4 -> [0,136,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystatechange-loaded.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:02 INFO - PROCESS | 2300 | ++DOCSHELL 196D1400 == 31 [pid = 2300] [id = 36]
14:13:02 INFO - PROCESS | 2300 | ++DOMWINDOW == 74 (1ADB2800) [pid = 2300] [serial = 105] [outer = 00000000]
14:13:02 INFO - PROCESS | 2300 | ++DOMWINDOW == 75 (1B028000) [pid = 2300] [serial = 106] [outer = 1ADB2800]
14:13:02 INFO - PROCESS | 2300 | 1478643182574 Marionette DEBUG loaded listener.js
14:13:02 INFO - PROCESS | 2300 | ++DOMWINDOW == 76 (1B02AC00) [pid = 2300] [serial = 107] [outer = 1ADB2800]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 75 (1A0EBC00) [pid = 2300] [serial = 73] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 74 (1A0EFC00) [pid = 2300] [serial = 74] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 73 (196EEC00) [pid = 2300] [serial = 70] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 72 (198C6C00) [pid = 2300] [serial = 71] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 71 (192AF400) [pid = 2300] [serial = 67] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 70 (192B8800) [pid = 2300] [serial = 68] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 69 (189C4800) [pid = 2300] [serial = 64] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 68 (18AC4000) [pid = 2300] [serial = 65] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 67 (18932000) [pid = 2300] [serial = 61] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 66 (18934800) [pid = 2300] [serial = 62] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 65 (18197000) [pid = 2300] [serial = 58] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 64 (1819C800) [pid = 2300] [serial = 59] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 63 (1764B800) [pid = 2300] [serial = 55] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 62 (17F3A800) [pid = 2300] [serial = 56] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 61 (16E43C00) [pid = 2300] [serial = 52] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 60 (16E48C00) [pid = 2300] [serial = 53] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 59 (16AAFC00) [pid = 2300] [serial = 49] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 58 (16AB7800) [pid = 2300] [serial = 50] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 57 (145C6800) [pid = 2300] [serial = 45] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 56 (145D3800) [pid = 2300] [serial = 46] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 55 (136A2000) [pid = 2300] [serial = 42] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 54 (13E0D000) [pid = 2300] [serial = 43] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 53 (124DD800) [pid = 2300] [serial = 39] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 52 (129B2000) [pid = 2300] [serial = 40] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 51 (0FF20400) [pid = 2300] [serial = 37] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 50 (1BD2F400) [pid = 2300] [serial = 31] [outer = 00000000] [url = about:blank]
14:13:05 INFO - PROCESS | 2300 | --DOMWINDOW == 49 (1A0F6400) [pid = 2300] [serial = 76] [outer = 00000000] [url = about:blank]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 48 (17F47C00) [pid = 2300] [serial = 81] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-abort.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 47 (196ED400) [pid = 2300] [serial = 84] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 46 (12941C00) [pid = 2300] [serial = 78] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/data-uri.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 45 (12E0D400) [pid = 2300] [serial = 90] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-load.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 44 (1AD0D800) [pid = 2300] [serial = 87] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 43 (147F5000) [pid = 2300] [serial = 93] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 42 (18930800) [pid = 2300] [serial = 96] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 41 (19A5D000) [pid = 2300] [serial = 75] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 40 (19A63400) [pid = 2300] [serial = 102] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm]
14:13:08 INFO - PROCESS | 2300 | --DOMWINDOW == 39 (1985A000) [pid = 2300] [serial = 99] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-progress.htm]
14:13:08 INFO - PROCESS | 2300 | 1478643188948 Marionette TRACE conn4 <- [1,136,null,{"value":["/XMLHttpRequest/event-readystatechange-loaded.htm",0,null,null,[["XMLHttpRequest: the LOADING state change should only happen once",1,"assert_equals: LOADING state change may only be emitted once expected 1 but got 10","client.onreadystatechange<@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:29:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nTest.prototype.step_func/<@http://web-platform.test:8000/resources/testharness.js:1425:20\nEventHandlerNonNull*@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:23:33\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:19:1\n"]]]}]
14:13:09 INFO - .
14:13:09 INFO - TEST-OK | /XMLHttpRequest/event-readystatechange-loaded.htm | took 6688ms
14:13:09 INFO - PROCESS | 2300 | 1478643189021 Marionette TRACE conn4 -> [0,137,"getWindowHandle",null]
14:13:09 INFO - PROCESS | 2300 | 1478643189024 Marionette TRACE conn4 <- [1,137,null,{"value":"13"}]
14:13:09 INFO - TEST-START | /XMLHttpRequest/event-timeout-order.htm
14:13:09 INFO - PROCESS | 2300 | 1478643189031 Marionette TRACE conn4 -> [0,138,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:09 INFO - PROCESS | 2300 | 1478643189132 Marionette TRACE conn4 <- [1,138,null,{"value":null}]
14:13:09 INFO - PROCESS | 2300 | 1478643189139 Marionette TRACE conn4 -> [0,139,"getWindowHandles",null]
14:13:09 INFO - PROCESS | 2300 | 1478643189141 Marionette TRACE conn4 <- [1,139,null,["13"]]
14:13:09 INFO - PROCESS | 2300 | 1478643189146 Marionette TRACE conn4 -> [0,140,"switchToWindow",{"name":"13"}]
14:13:09 INFO - PROCESS | 2300 | 1478643189151 Marionette TRACE conn4 <- [1,140,null,{}]
14:13:09 INFO - PROCESS | 2300 | 1478643189155 Marionette TRACE conn4 -> [0,141,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:09 INFO - PROCESS | 2300 | ++DOCSHELL 13699C00 == 32 [pid = 2300] [id = 37]
14:13:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 40 (1369B400) [pid = 2300] [serial = 108] [outer = 00000000]
14:13:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 41 (145D3800) [pid = 2300] [serial = 109] [outer = 1369B400]
14:13:09 INFO - PROCESS | 2300 | 1478643189223 Marionette DEBUG loaded listener.js
14:13:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 42 (147EB400) [pid = 2300] [serial = 110] [outer = 1369B400]
14:13:09 INFO - PROCESS | 2300 | 1478643189615 Marionette TRACE conn4 <- [1,141,null,{"value":["/XMLHttpRequest/event-timeout-order.htm",0,null,null,[["XMLHttpRequest: event - timeout (order of events)",0,null,null]]]}]
14:13:09 INFO - .
14:13:09 INFO - TEST-OK | /XMLHttpRequest/event-timeout-order.htm | took 641ms
14:13:09 INFO - PROCESS | 2300 | 1478643189669 Marionette TRACE conn4 -> [0,142,"getWindowHandle",null]
14:13:09 INFO - PROCESS | 2300 | 1478643189672 Marionette TRACE conn4 <- [1,142,null,{"value":"13"}]
14:13:09 INFO - TEST-START | /XMLHttpRequest/event-timeout.htm
14:13:09 INFO - PROCESS | 2300 | 1478643189678 Marionette TRACE conn4 -> [0,143,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:09 INFO - PROCESS | 2300 | 1478643189809 Marionette TRACE conn4 <- [1,143,null,{"value":null}]
14:13:09 INFO - PROCESS | 2300 | 1478643189816 Marionette TRACE conn4 -> [0,144,"getWindowHandles",null]
14:13:09 INFO - PROCESS | 2300 | 1478643189818 Marionette TRACE conn4 <- [1,144,null,["13"]]
14:13:09 INFO - PROCESS | 2300 | 1478643189823 Marionette TRACE conn4 -> [0,145,"switchToWindow",{"name":"13"}]
14:13:09 INFO - PROCESS | 2300 | 1478643189827 Marionette TRACE conn4 <- [1,145,null,{}]
14:13:09 INFO - PROCESS | 2300 | 1478643189831 Marionette TRACE conn4 -> [0,146,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:09 INFO - PROCESS | 2300 | ++DOCSHELL 15227800 == 33 [pid = 2300] [id = 38]
14:13:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 43 (15227400) [pid = 2300] [serial = 111] [outer = 00000000]
14:13:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 44 (153D2400) [pid = 2300] [serial = 112] [outer = 15227400]
14:13:09 INFO - PROCESS | 2300 | 1478643189898 Marionette DEBUG loaded listener.js
14:13:09 INFO - PROCESS | 2300 | ++DOMWINDOW == 45 (158BBC00) [pid = 2300] [serial = 113] [outer = 15227400]
14:13:10 INFO - PROCESS | 2300 | 1478643190183 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
14:13:10 INFO - PROCESS | 2300 | 1478643190309 Marionette TRACE conn4 <- [1,146,null,{"value":["/XMLHttpRequest/event-timeout.htm",0,null,null,[["XMLHttpRequest: timeout event",0,null,null]]]}]
14:13:10 INFO - .
14:13:10 INFO - TEST-OK | /XMLHttpRequest/event-timeout.htm | took 672ms
14:13:10 INFO - PROCESS | 2300 | 1478643190366 Marionette TRACE conn4 -> [0,147,"getWindowHandle",null]
14:13:10 INFO - PROCESS | 2300 | 1478643190374 Marionette TRACE conn4 <- [1,147,null,{"value":"13"}]
14:13:10 INFO - TEST-START | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm
14:13:10 INFO - PROCESS | 2300 | 1478643190379 Marionette TRACE conn4 -> [0,148,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:10 INFO - PROCESS | 2300 | 1478643190483 Marionette TRACE conn4 <- [1,148,null,{"value":null}]
14:13:10 INFO - PROCESS | 2300 | 1478643190491 Marionette TRACE conn4 -> [0,149,"getWindowHandles",null]
14:13:10 INFO - PROCESS | 2300 | 1478643190494 Marionette TRACE conn4 <- [1,149,null,["13"]]
14:13:10 INFO - PROCESS | 2300 | 1478643190497 Marionette TRACE conn4 -> [0,150,"switchToWindow",{"name":"13"}]
14:13:10 INFO - PROCESS | 2300 | 1478643190502 Marionette TRACE conn4 <- [1,150,null,{}]
14:13:10 INFO - PROCESS | 2300 | 1478643190507 Marionette TRACE conn4 -> [0,151,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:10 INFO - PROCESS | 2300 | ++DOCSHELL 16E4C000 == 34 [pid = 2300] [id = 39]
14:13:10 INFO - PROCESS | 2300 | ++DOMWINDOW == 46 (16E4C400) [pid = 2300] [serial = 114] [outer = 00000000]
14:13:10 INFO - PROCESS | 2300 | ++DOMWINDOW == 47 (17720000) [pid = 2300] [serial = 115] [outer = 16E4C400]
14:13:10 INFO - PROCESS | 2300 | 1478643190575 Marionette DEBUG loaded listener.js
14:13:10 INFO - PROCESS | 2300 | ++DOMWINDOW == 48 (17F39400) [pid = 2300] [serial = 116] [outer = 16E4C400]
14:13:10 INFO - PROCESS | 2300 | 1478643190951 Marionette TRACE conn4 <- [1,151,null,{"value":["/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm",0,null,null,[["XMLHttpRequest: upload progress event for cross-origin requests",0,null,null]]]}]
14:13:11 INFO - .
14:13:11 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm | took 625ms
14:13:11 INFO - PROCESS | 2300 | 1478643191018 Marionette TRACE conn4 -> [0,152,"getWindowHandle",null]
14:13:11 INFO - PROCESS | 2300 | 1478643191022 Marionette TRACE conn4 <- [1,152,null,{"value":"13"}]
14:13:11 INFO - TEST-START | /XMLHttpRequest/event-upload-progress.htm
14:13:11 INFO - PROCESS | 2300 | 1478643191030 Marionette TRACE conn4 -> [0,153,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:11 INFO - PROCESS | 2300 | 1478643191126 Marionette TRACE conn4 <- [1,153,null,{"value":null}]
14:13:11 INFO - PROCESS | 2300 | 1478643191131 Marionette TRACE conn4 -> [0,154,"getWindowHandles",null]
14:13:11 INFO - PROCESS | 2300 | 1478643191133 Marionette TRACE conn4 <- [1,154,null,["13"]]
14:13:11 INFO - PROCESS | 2300 | 1478643191137 Marionette TRACE conn4 -> [0,155,"switchToWindow",{"name":"13"}]
14:13:11 INFO - PROCESS | 2300 | 1478643191141 Marionette TRACE conn4 <- [1,155,null,{}]
14:13:11 INFO - PROCESS | 2300 | 1478643191144 Marionette TRACE conn4 -> [0,156,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:11 INFO - PROCESS | 2300 | ++DOCSHELL 166D8C00 == 35 [pid = 2300] [id = 40]
14:13:11 INFO - PROCESS | 2300 | ++DOMWINDOW == 49 (18191400) [pid = 2300] [serial = 117] [outer = 00000000]
14:13:11 INFO - PROCESS | 2300 | ++DOMWINDOW == 50 (19269000) [pid = 2300] [serial = 118] [outer = 18191400]
14:13:11 INFO - PROCESS | 2300 | 1478643191211 Marionette DEBUG loaded listener.js
14:13:11 INFO - PROCESS | 2300 | ++DOMWINDOW == 51 (192BC800) [pid = 2300] [serial = 119] [outer = 18191400]
14:13:11 INFO - PROCESS | 2300 | 1478643191675 Marionette TRACE conn4 <- [1,156,null,{"value":["/XMLHttpRequest/event-upload-progress.htm",0,null,null,[["XMLHttpRequest: upload progress event",0,null,null]]]}]
14:13:11 INFO - .
14:13:11 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress.htm | took 703ms
14:13:11 INFO - PROCESS | 2300 | 1478643191725 Marionette TRACE conn4 -> [0,157,"getWindowHandle",null]
14:13:11 INFO - TEST-START | /XMLHttpRequest/formdata-blob.htm
14:13:11 INFO - PROCESS | 2300 | 1478643191730 Marionette TRACE conn4 <- [1,157,null,{"value":"13"}]
14:13:11 INFO - PROCESS | 2300 | 1478643191738 Marionette TRACE conn4 -> [0,158,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:11 INFO - PROCESS | 2300 | 1478643191904 Marionette TRACE conn4 <- [1,158,null,{"value":null}]
14:13:11 INFO - PROCESS | 2300 | 1478643191970 Marionette TRACE conn4 -> [0,159,"getWindowHandles",null]
14:13:11 INFO - PROCESS | 2300 | 1478643191975 Marionette TRACE conn4 <- [1,159,null,["13"]]
14:13:12 INFO - PROCESS | 2300 | 1478643192024 Marionette TRACE conn4 -> [0,160,"switchToWindow",{"name":"13"}]
14:13:12 INFO - PROCESS | 2300 | 1478643192030 Marionette TRACE conn4 <- [1,160,null,{}]
14:13:12 INFO - PROCESS | 2300 | 1478643192034 Marionette TRACE conn4 -> [0,161,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-blob.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:12 INFO - PROCESS | 2300 | ++DOCSHELL 13697400 == 36 [pid = 2300] [id = 41]
14:13:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 52 (1417C800) [pid = 2300] [serial = 120] [outer = 00000000]
14:13:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 53 (14753000) [pid = 2300] [serial = 121] [outer = 1417C800]
14:13:12 INFO - PROCESS | 2300 | 1478643192121 Marionette DEBUG loaded listener.js
14:13:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 54 (149B8800) [pid = 2300] [serial = 122] [outer = 1417C800]
14:13:12 INFO - PROCESS | 2300 | 1478643192563 Marionette TRACE conn4 <- [1,161,null,{"value":["/XMLHttpRequest/formdata-blob.htm",0,null,null,[["formdata with blob",0,null,null],["formdata with named blob",0,null,null],["formdata.append() should throw if value is string and file name is given",0,null,null]]]}]
14:13:12 INFO - ...
14:13:12 INFO - TEST-OK | /XMLHttpRequest/formdata-blob.htm | took 891ms
14:13:12 INFO - PROCESS | 2300 | 1478643192619 Marionette TRACE conn4 -> [0,162,"getWindowHandle",null]
14:13:12 INFO - PROCESS | 2300 | 1478643192623 Marionette TRACE conn4 <- [1,162,null,{"value":"13"}]
14:13:12 INFO - PROCESS | 2300 | 1478643192628 Marionette TRACE conn4 -> [0,163,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:12 INFO - TEST-START | /XMLHttpRequest/formdata-delete.htm
14:13:12 INFO - PROCESS | 2300 | 1478643192783 Marionette TRACE conn4 <- [1,163,null,{"value":null}]
14:13:12 INFO - PROCESS | 2300 | 1478643192850 Marionette TRACE conn4 -> [0,164,"getWindowHandles",null]
14:13:12 INFO - PROCESS | 2300 | 1478643192854 Marionette TRACE conn4 <- [1,164,null,["13"]]
14:13:12 INFO - PROCESS | 2300 | 1478643192898 Marionette TRACE conn4 -> [0,165,"switchToWindow",{"name":"13"}]
14:13:12 INFO - PROCESS | 2300 | 1478643192903 Marionette TRACE conn4 <- [1,165,null,{}]
14:13:12 INFO - PROCESS | 2300 | 1478643192908 Marionette TRACE conn4 -> [0,166,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-delete.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:12 INFO - PROCESS | 2300 | ++DOCSHELL 153DD000 == 37 [pid = 2300] [id = 42]
14:13:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 55 (158C2400) [pid = 2300] [serial = 123] [outer = 00000000]
14:13:12 INFO - PROCESS | 2300 | ++DOMWINDOW == 56 (16C8DC00) [pid = 2300] [serial = 124] [outer = 158C2400]
14:13:12 INFO - PROCESS | 2300 | 1478643192988 Marionette DEBUG loaded listener.js
14:13:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 57 (1771D400) [pid = 2300] [serial = 125] [outer = 158C2400]
14:13:13 INFO - PROCESS | 2300 | 1478643193440 Marionette TRACE conn4 <- [1,166,null,{"value":["/XMLHttpRequest/formdata-delete.htm",0,null,null,[["testFormDataDelete",0,null,null],["testFormDataDeleteFromForm",0,null,null],["testFormDataDeleteFromFormNonExistentKey",0,null,null],["testFormDataDeleteFromFormOtherKey",0,null,null],["testFormDataDeleteFromEmptyForm",0,null,null],["testFormDataDeleteNonExistentKey",0,null,null],["testFormDataDeleteOtherKey",0,null,null]]]}]
14:13:13 INFO - .......
14:13:13 INFO - TEST-OK | /XMLHttpRequest/formdata-delete.htm | took 828ms
14:13:13 INFO - PROCESS | 2300 | 1478643193480 Marionette TRACE conn4 -> [0,167,"getWindowHandle",null]
14:13:13 INFO - PROCESS | 2300 | 1478643193486 Marionette TRACE conn4 <- [1,167,null,{"value":"13"}]
14:13:13 INFO - TEST-START | /XMLHttpRequest/formdata-foreach.html
14:13:13 INFO - PROCESS | 2300 | 1478643193490 Marionette TRACE conn4 -> [0,168,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:13 INFO - PROCESS | 2300 | 1478643193637 Marionette TRACE conn4 <- [1,168,null,{"value":null}]
14:13:13 INFO - PROCESS | 2300 | 1478643193706 Marionette TRACE conn4 -> [0,169,"getWindowHandles",null]
14:13:13 INFO - PROCESS | 2300 | 1478643193709 Marionette TRACE conn4 <- [1,169,null,["13"]]
14:13:13 INFO - PROCESS | 2300 | 1478643193713 Marionette TRACE conn4 -> [0,170,"switchToWindow",{"name":"13"}]
14:13:13 INFO - PROCESS | 2300 | 1478643193718 Marionette TRACE conn4 <- [1,170,null,{}]
14:13:13 INFO - PROCESS | 2300 | 1478643193767 Marionette TRACE conn4 -> [0,171,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-foreach.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:13 INFO - PROCESS | 2300 | ++DOCSHELL 196F0800 == 38 [pid = 2300] [id = 43]
14:13:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 58 (196F0C00) [pid = 2300] [serial = 126] [outer = 00000000]
14:13:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 59 (19A62400) [pid = 2300] [serial = 127] [outer = 196F0C00]
14:13:13 INFO - PROCESS | 2300 | 1478643193849 Marionette DEBUG loaded listener.js
14:13:13 INFO - PROCESS | 2300 | ++DOMWINDOW == 60 (1A0EC000) [pid = 2300] [serial = 128] [outer = 196F0C00]
14:13:14 INFO - PROCESS | 2300 | 1478643194250 Marionette TRACE conn4 <- [1,171,null,{"value":["/XMLHttpRequest/formdata-foreach.html",0,null,null,[["Iterator should return duplicate keys and non-deleted values",0,null,null],["Entries iterator should return duplicate keys and non-deleted values",0,null,null],["Keys iterator should return duplicates",0,null,null],["Values iterator should return non-deleted values",0,null,null]]]}]
14:13:14 INFO - ....
14:13:14 INFO - TEST-OK | /XMLHttpRequest/formdata-foreach.html | took 781ms
14:13:14 INFO - PROCESS | 2300 | 1478643194271 Marionette TRACE conn4 -> [0,172,"getWindowHandle",null]
14:13:14 INFO - PROCESS | 2300 | 1478643194274 Marionette TRACE conn4 <- [1,172,null,{"value":"13"}]
14:13:14 INFO - TEST-START | /XMLHttpRequest/formdata-get.htm
14:13:14 INFO - PROCESS | 2300 | 1478643194279 Marionette TRACE conn4 -> [0,173,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:14 INFO - PROCESS | 2300 | 1478643194398 Marionette TRACE conn4 <- [1,173,null,{"value":null}]
14:13:14 INFO - PROCESS | 2300 | 1478643194470 Marionette TRACE conn4 -> [0,174,"getWindowHandles",null]
14:13:14 INFO - PROCESS | 2300 | 1478643194473 Marionette TRACE conn4 <- [1,174,null,["13"]]
14:13:14 INFO - PROCESS | 2300 | 1478643194476 Marionette TRACE conn4 -> [0,175,"switchToWindow",{"name":"13"}]
14:13:14 INFO - PROCESS | 2300 | 1478643194481 Marionette TRACE conn4 <- [1,175,null,{}]
14:13:14 INFO - PROCESS | 2300 | 1478643194526 Marionette TRACE conn4 -> [0,176,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-get.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:14 INFO - PROCESS | 2300 | ++DOCSHELL 1A36E000 == 39 [pid = 2300] [id = 44]
14:13:14 INFO - PROCESS | 2300 | ++DOMWINDOW == 61 (1A36E400) [pid = 2300] [serial = 129] [outer = 00000000]
14:13:14 INFO - PROCESS | 2300 | ++DOMWINDOW == 62 (1AD14C00) [pid = 2300] [serial = 130] [outer = 1A36E400]
14:13:14 INFO - PROCESS | 2300 | 1478643194603 Marionette DEBUG loaded listener.js
14:13:14 INFO - PROCESS | 2300 | ++DOMWINDOW == 63 (1ADAC800) [pid = 2300] [serial = 131] [outer = 1A36E400]
14:13:15 INFO - PROCESS | 2300 | 1478643195041 Marionette TRACE conn4 <- [1,176,null,{"value":["/XMLHttpRequest/formdata-get.htm",0,null,null,[["testFormDataGet",0,null,null],["testFormDataGetFromForm",0,null,null],["testFormDataGetFromFormNull",0,null,null],["testFormDataGetFromEmptyForm",0,null,null],["testFormDataGetNull1",0,null,null],["testFormDataGetNull2",0,null,null],["testFormDataGetAll",0,null,null],["testFormDataGetAllEmpty1",0,null,null],["testFormDataGetAllEmpty2",0,null,null],["testFormDataGetAllFromForm",0,null,null],["testFormDataGetAllFromFormNull",0,null,null],["testFormDataGetAllFromEmptyForm",0,null,null]]]}]
14:13:15 INFO - ............
14:13:15 INFO - TEST-OK | /XMLHttpRequest/formdata-get.htm | took 781ms
14:13:15 INFO - PROCESS | 2300 | 1478643195058 Marionette TRACE conn4 -> [0,177,"getWindowHandle",null]
14:13:15 INFO - PROCESS | 2300 | 1478643195062 Marionette TRACE conn4 <- [1,177,null,{"value":"13"}]
14:13:15 INFO - TEST-START | /XMLHttpRequest/formdata-has.htm
14:13:15 INFO - PROCESS | 2300 | 1478643195066 Marionette TRACE conn4 -> [0,178,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:15 INFO - PROCESS | 2300 | 1478643195177 Marionette TRACE conn4 <- [1,178,null,{"value":null}]
14:13:15 INFO - PROCESS | 2300 | 1478643195245 Marionette TRACE conn4 -> [0,179,"getWindowHandles",null]
14:13:15 INFO - PROCESS | 2300 | 1478643195247 Marionette TRACE conn4 <- [1,179,null,["13"]]
14:13:15 INFO - PROCESS | 2300 | 1478643195252 Marionette TRACE conn4 -> [0,180,"switchToWindow",{"name":"13"}]
14:13:15 INFO - PROCESS | 2300 | 1478643195257 Marionette TRACE conn4 <- [1,180,null,{}]
14:13:15 INFO - PROCESS | 2300 | 1478643195261 Marionette TRACE conn4 -> [0,181,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-has.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:15 INFO - PROCESS | 2300 | ++DOCSHELL 0F27E400 == 40 [pid = 2300] [id = 45]
14:13:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 64 (0F27F000) [pid = 2300] [serial = 132] [outer = 00000000]
14:13:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 65 (143D5000) [pid = 2300] [serial = 133] [outer = 0F27F000]
14:13:15 INFO - PROCESS | 2300 | 1478643195380 Marionette DEBUG loaded listener.js
14:13:15 INFO - PROCESS | 2300 | ++DOMWINDOW == 66 (16AB3400) [pid = 2300] [serial = 134] [outer = 0F27F000]
14:13:15 INFO - PROCESS | 2300 | 1478643195856 Marionette TRACE conn4 <- [1,181,null,{"value":["/XMLHttpRequest/formdata-has.htm",0,null,null,[["testFormDataHas",0,null,null],["testFormDataHasFromForm",0,null,null],["testFormDataHasFromFormNull",0,null,null],["testFormDataHasFromEmptyForm",0,null,null],["testFormDataHasEmpty1",0,null,null],["testFormDataHasEmpty2",0,null,null]]]}]
14:13:15 INFO - ......
14:13:15 INFO - TEST-OK | /XMLHttpRequest/formdata-has.htm | took 828ms
14:13:15 INFO - PROCESS | 2300 | 1478643195908 Marionette TRACE conn4 -> [0,182,"getWindowHandle",null]
14:13:15 INFO - PROCESS | 2300 | 1478643195913 Marionette TRACE conn4 <- [1,182,null,{"value":"13"}]
14:13:15 INFO - TEST-START | /XMLHttpRequest/formdata-set.htm
14:13:15 INFO - PROCESS | 2300 | 1478643195921 Marionette TRACE conn4 -> [0,183,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:16 INFO - PROCESS | 2300 | 1478643196091 Marionette TRACE conn4 <- [1,183,null,{"value":null}]
14:13:16 INFO - PROCESS | 2300 | --DOCSHELL 16E4C000 == 39 [pid = 2300] [id = 39]
14:13:16 INFO - PROCESS | 2300 | --DOCSHELL 15227800 == 38 [pid = 2300] [id = 38]
14:13:16 INFO - PROCESS | 2300 | --DOCSHELL 13699C00 == 37 [pid = 2300] [id = 37]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 65 (1B028000) [pid = 2300] [serial = 106] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 64 (1AD11000) [pid = 2300] [serial = 103] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 63 (1AD19C00) [pid = 2300] [serial = 104] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 62 (19A6BC00) [pid = 2300] [serial = 100] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 61 (1A362C00) [pid = 2300] [serial = 101] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 60 (18F13C00) [pid = 2300] [serial = 97] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 59 (1926A400) [pid = 2300] [serial = 98] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 58 (16E4FC00) [pid = 2300] [serial = 94] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 57 (1764B400) [pid = 2300] [serial = 95] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 56 (145CD800) [pid = 2300] [serial = 91] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 55 (149C2400) [pid = 2300] [serial = 92] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 54 (1AD14000) [pid = 2300] [serial = 88] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 53 (1ADA8C00) [pid = 2300] [serial = 89] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 52 (1A0EB000) [pid = 2300] [serial = 85] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 51 (1A0F6000) [pid = 2300] [serial = 86] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 50 (18196400) [pid = 2300] [serial = 82] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 49 (18931400) [pid = 2300] [serial = 83] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 48 (13C7E800) [pid = 2300] [serial = 79] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 47 (13E78400) [pid = 2300] [serial = 80] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | --DOMWINDOW == 46 (1A363000) [pid = 2300] [serial = 77] [outer = 00000000] [url = about:blank]
14:13:16 INFO - PROCESS | 2300 | 1478643196170 Marionette TRACE conn4 -> [0,184,"getWindowHandles",null]
14:13:16 INFO - PROCESS | 2300 | 1478643196173 Marionette TRACE conn4 <- [1,184,null,["13"]]
14:13:16 INFO - PROCESS | 2300 | 1478643196196 Marionette TRACE conn4 -> [0,185,"switchToWindow",{"name":"13"}]
14:13:16 INFO - PROCESS | 2300 | 1478643196201 Marionette TRACE conn4 <- [1,185,null,{}]
14:13:16 INFO - PROCESS | 2300 | 1478643196228 Marionette TRACE conn4 -> [0,186,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-set.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:16 INFO - PROCESS | 2300 | ++DOCSHELL 13E76000 == 38 [pid = 2300] [id = 46]
14:13:16 INFO - PROCESS | 2300 | ++DOMWINDOW == 47 (13E77C00) [pid = 2300] [serial = 135] [outer = 00000000]
14:13:16 INFO - PROCESS | 2300 | ++DOMWINDOW == 48 (14183C00) [pid = 2300] [serial = 136] [outer = 13E77C00]
14:13:16 INFO - PROCESS | 2300 | 1478643196297 Marionette DEBUG loaded listener.js
14:13:16 INFO - PROCESS | 2300 | ++DOMWINDOW == 49 (145D1C00) [pid = 2300] [serial = 137] [outer = 13E77C00]
14:13:16 INFO - PROCESS | 2300 | 1478643196678 Marionette TRACE conn4 <- [1,186,null,{"value":["/XMLHttpRequest/formdata-set.htm",0,null,null,[["Passing a String object to FormData.set should work",0,null,null],["testFormDataSet1",0,null,null],["testFormDataSet2",0,null,null],["testFormDataSetUndefined1",0,null,null],["testFormDataSetUndefined2",0,null,null],["testFormDataSetNull1",0,null,null],["testFormDataSetNull2",0,null,null],["testFormDataSetToForm1",0,null,null],["testFormDataSetToForm2",0,null,null],["testFormDataSetToFormUndefined1",0,null,null],["testFormDataSetToFormUndefined2",0,null,null],["testFormDataSetToFormNull1",0,null,null],["testFormDataSetToFormNull2",0,null,null],["testFormDataSetEmptyBlob",0,null,null]]]}]
14:13:16 INFO - ..............
14:13:16 INFO - TEST-OK | /XMLHttpRequest/formdata-set.htm | took 781ms
14:13:16 INFO - PROCESS | 2300 | 1478643196702 Marionette TRACE conn4 -> [0,187,"getWindowHandle",null]
14:13:16 INFO - PROCESS | 2300 | 1478643196705 Marionette TRACE conn4 <- [1,187,null,{"value":"13"}]
14:13:16 INFO - TEST-START | /XMLHttpRequest/formdata.htm
14:13:16 INFO - PROCESS | 2300 | 1478643196710 Marionette TRACE conn4 -> [0,188,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:16 INFO - PROCESS | 2300 | 1478643196816 Marionette TRACE conn4 <- [1,188,null,{"value":null}]
14:13:16 INFO - PROCESS | 2300 | 1478643196823 Marionette TRACE conn4 -> [0,189,"getWindowHandles",null]
14:13:16 INFO - PROCESS | 2300 | 1478643196826 Marionette TRACE conn4 <- [1,189,null,["13"]]
14:13:16 INFO - PROCESS | 2300 | 1478643196830 Marionette TRACE conn4 -> [0,190,"switchToWindow",{"name":"13"}]
14:13:16 INFO - PROCESS | 2300 | 1478643196833 Marionette TRACE conn4 <- [1,190,null,{}]
14:13:16 INFO - PROCESS | 2300 | 1478643196840 Marionette TRACE conn4 -> [0,191,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:16 INFO - PROCESS | 2300 | ++DOCSHELL 15366000 == 39 [pid = 2300] [id = 47]
14:13:16 INFO - PROCESS | 2300 | ++DOMWINDOW == 50 (153D5400) [pid = 2300] [serial = 138] [outer = 00000000]
14:13:16 INFO - PROCESS | 2300 | ++DOMWINDOW == 51 (16E4EC00) [pid = 2300] [serial = 139] [outer = 153D5400]
14:13:16 INFO - PROCESS | 2300 | 1478643196908 Marionette DEBUG loaded listener.js
14:13:16 INFO - PROCESS | 2300 | ++DOMWINDOW == 52 (17F3A800) [pid = 2300] [serial = 140] [outer = 153D5400]
14:13:17 INFO - PROCESS | 2300 | 1478643197296 Marionette TRACE conn4 <- [1,191,null,{"value":["/XMLHttpRequest/formdata.htm",0,null,null,[["empty formdata",0,null,null],["formdata with string",0,null,null],["formdata with named string",0,null,null],["formdata from form",0,null,null]]]}]
14:13:17 INFO - ....
14:13:17 INFO - TEST-OK | /XMLHttpRequest/formdata.htm | took 640ms
14:13:17 INFO - PROCESS | 2300 | 1478643197355 Marionette TRACE conn4 -> [0,192,"getWindowHandle",null]
14:13:17 INFO - PROCESS | 2300 | 1478643197360 Marionette TRACE conn4 <- [1,192,null,{"value":"13"}]
14:13:17 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-cookies.htm
14:13:17 INFO - PROCESS | 2300 | 1478643197365 Marionette TRACE conn4 -> [0,193,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:17 INFO - PROCESS | 2300 | 1478643197460 Marionette TRACE conn4 <- [1,193,null,{"value":null}]
14:13:17 INFO - PROCESS | 2300 | 1478643197468 Marionette TRACE conn4 -> [0,194,"getWindowHandles",null]
14:13:17 INFO - PROCESS | 2300 | 1478643197471 Marionette TRACE conn4 <- [1,194,null,["13"]]
14:13:17 INFO - PROCESS | 2300 | 1478643197474 Marionette TRACE conn4 -> [0,195,"switchToWindow",{"name":"13"}]
14:13:17 INFO - PROCESS | 2300 | 1478643197479 Marionette TRACE conn4 <- [1,195,null,{}]
14:13:17 INFO - PROCESS | 2300 | 1478643197482 Marionette TRACE conn4 -> [0,196,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-cookies.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:17 INFO - PROCESS | 2300 | ++DOCSHELL 1863A400 == 40 [pid = 2300] [id = 48]
14:13:17 INFO - PROCESS | 2300 | ++DOMWINDOW == 53 (189BD000) [pid = 2300] [serial = 141] [outer = 00000000]
14:13:17 INFO - PROCESS | 2300 | ++DOMWINDOW == 54 (196D4000) [pid = 2300] [serial = 142] [outer = 189BD000]
14:13:17 INFO - PROCESS | 2300 | 1478643197554 Marionette DEBUG loaded listener.js
14:13:17 INFO - PROCESS | 2300 | ++DOMWINDOW == 55 (198C4800) [pid = 2300] [serial = 143] [outer = 189BD000]
14:13:17 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:17 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:17 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:17 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:17 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:17 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:17 INFO - PROCESS | 2300 | 1478643197919 Marionette TRACE conn4 <- [1,196,null,{"value":["/XMLHttpRequest/getallresponseheaders-cookies.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes cookies",0,null,null]]]}]
14:13:17 INFO - .
14:13:17 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-cookies.htm | took 578ms
14:13:17 INFO - PROCESS | 2300 | 1478643197941 Marionette TRACE conn4 -> [0,197,"getWindowHandle",null]
14:13:17 INFO - PROCESS | 2300 | 1478643197944 Marionette TRACE conn4 <- [1,197,null,{"value":"13"}]
14:13:17 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-status.htm
14:13:17 INFO - PROCESS | 2300 | 1478643197949 Marionette TRACE conn4 -> [0,198,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:18 INFO - PROCESS | 2300 | 1478643198056 Marionette TRACE conn4 <- [1,198,null,{"value":null}]
14:13:18 INFO - PROCESS | 2300 | 1478643198061 Marionette TRACE conn4 -> [0,199,"getWindowHandles",null]
14:13:18 INFO - PROCESS | 2300 | 1478643198063 Marionette TRACE conn4 <- [1,199,null,["13"]]
14:13:18 INFO - PROCESS | 2300 | 1478643198067 Marionette TRACE conn4 -> [0,200,"switchToWindow",{"name":"13"}]
14:13:18 INFO - PROCESS | 2300 | 1478643198071 Marionette TRACE conn4 <- [1,200,null,{}]
14:13:18 INFO - PROCESS | 2300 | 1478643198074 Marionette TRACE conn4 -> [0,201,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-status.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:18 INFO - PROCESS | 2300 | ++DOCSHELL 193D0400 == 41 [pid = 2300] [id = 49]
14:13:18 INFO - PROCESS | 2300 | ++DOMWINDOW == 56 (1A0F1000) [pid = 2300] [serial = 144] [outer = 00000000]
14:13:18 INFO - PROCESS | 2300 | ++DOMWINDOW == 57 (1A370C00) [pid = 2300] [serial = 145] [outer = 1A0F1000]
14:13:18 INFO - PROCESS | 2300 | 1478643198136 Marionette DEBUG loaded listener.js
14:13:18 INFO - PROCESS | 2300 | ++DOMWINDOW == 58 (1AD16400) [pid = 2300] [serial = 146] [outer = 1A0F1000]
14:13:18 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:18 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:18 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:18 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:18 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:18 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:18 INFO - PROCESS | 2300 | 1478643198525 Marionette TRACE conn4 <- [1,201,null,{"value":["/XMLHttpRequest/getallresponseheaders-status.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes status",0,null,null]]]}]
14:13:18 INFO - .
14:13:18 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-status.htm | took 641ms
14:13:18 INFO - PROCESS | 2300 | 1478643198586 Marionette TRACE conn4 -> [0,202,"getWindowHandle",null]
14:13:18 INFO - PROCESS | 2300 | 1478643198588 Marionette TRACE conn4 <- [1,202,null,{"value":"13"}]
14:13:18 INFO - TEST-START | /XMLHttpRequest/getresponseheader-case-insensitive.htm
14:13:18 INFO - PROCESS | 2300 | 1478643198593 Marionette TRACE conn4 -> [0,203,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:18 INFO - PROCESS | 2300 | 1478643198712 Marionette TRACE conn4 <- [1,203,null,{"value":null}]
14:13:18 INFO - PROCESS | 2300 | 1478643198718 Marionette TRACE conn4 -> [0,204,"getWindowHandles",null]
14:13:18 INFO - PROCESS | 2300 | 1478643198720 Marionette TRACE conn4 <- [1,204,null,["13"]]
14:13:18 INFO - PROCESS | 2300 | 1478643198723 Marionette TRACE conn4 -> [0,205,"switchToWindow",{"name":"13"}]
14:13:18 INFO - PROCESS | 2300 | 1478643198726 Marionette TRACE conn4 <- [1,205,null,{}]
14:13:18 INFO - PROCESS | 2300 | 1478643198768 Marionette TRACE conn4 -> [0,206,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:18 INFO - PROCESS | 2300 | ++DOCSHELL 1ADA8C00 == 42 [pid = 2300] [id = 50]
14:13:18 INFO - PROCESS | 2300 | ++DOMWINDOW == 59 (1ADA9000) [pid = 2300] [serial = 147] [outer = 00000000]
14:13:18 INFO - PROCESS | 2300 | ++DOMWINDOW == 60 (1AF80800) [pid = 2300] [serial = 148] [outer = 1ADA9000]
14:13:18 INFO - PROCESS | 2300 | 1478643198830 Marionette DEBUG loaded listener.js
14:13:18 INFO - PROCESS | 2300 | ++DOMWINDOW == 61 (1ADB5800) [pid = 2300] [serial = 149] [outer = 1ADA9000]
14:13:19 INFO - PROCESS | 2300 | --DOMWINDOW == 60 (1369B400) [pid = 2300] [serial = 108] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm]
14:13:19 INFO - PROCESS | 2300 | --DOMWINDOW == 59 (16E4C400) [pid = 2300] [serial = 114] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm]
14:13:19 INFO - PROCESS | 2300 | --DOMWINDOW == 58 (15227400) [pid = 2300] [serial = 111] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm]
14:13:19 INFO - PROCESS | 2300 | 1478643199183 Marionette TRACE conn4 <- [1,206,null,{"value":["/XMLHttpRequest/getresponseheader-case-insensitive.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() case-insensitive matching",0,null,null]]]}]
14:13:19 INFO - .
14:13:19 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-case-insensitive.htm | took 641ms
14:13:19 INFO - PROCESS | 2300 | 1478643199229 Marionette TRACE conn4 -> [0,207,"getWindowHandle",null]
14:13:19 INFO - PROCESS | 2300 | 1478643199232 Marionette TRACE conn4 <- [1,207,null,{"value":"13"}]
14:13:19 INFO - TEST-START | /XMLHttpRequest/getresponseheader-chunked-trailer.htm
14:13:19 INFO - PROCESS | 2300 | 1478643199236 Marionette TRACE conn4 -> [0,208,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:19 INFO - PROCESS | 2300 | 1478643199345 Marionette TRACE conn4 <- [1,208,null,{"value":null}]
14:13:19 INFO - PROCESS | 2300 | 1478643199418 Marionette TRACE conn4 -> [0,209,"getWindowHandles",null]
14:13:19 INFO - PROCESS | 2300 | 1478643199420 Marionette TRACE conn4 <- [1,209,null,["13"]]
14:13:19 INFO - PROCESS | 2300 | 1478643199423 Marionette TRACE conn4 -> [0,210,"switchToWindow",{"name":"13"}]
14:13:19 INFO - PROCESS | 2300 | 1478643199427 Marionette TRACE conn4 <- [1,210,null,{}]
14:13:19 INFO - PROCESS | 2300 | 1478643199431 Marionette TRACE conn4 -> [0,211,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-chunked-trailer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:19 INFO - PROCESS | 2300 | ++DOCSHELL 130D1400 == 43 [pid = 2300] [id = 51]
14:13:19 INFO - PROCESS | 2300 | ++DOMWINDOW == 59 (145CD800) [pid = 2300] [serial = 150] [outer = 00000000]
14:13:19 INFO - PROCESS | 2300 | ++DOMWINDOW == 60 (1ADB1C00) [pid = 2300] [serial = 151] [outer = 145CD800]
14:13:19 INFO - PROCESS | 2300 | 1478643199497 Marionette DEBUG loaded listener.js
14:13:19 INFO - PROCESS | 2300 | ++DOMWINDOW == 61 (1B030400) [pid = 2300] [serial = 152] [outer = 145CD800]
14:13:19 INFO - PROCESS | 2300 | 1478643199792 Marionette TRACE conn4 <- [1,211,null,{"value":["/XMLHttpRequest/getresponseheader-chunked-trailer.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() and HTTP trailer",0,null,null]]]}]
14:13:19 INFO - .
14:13:19 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-chunked-trailer.htm | took 563ms
14:13:19 INFO - PROCESS | 2300 | 1478643199811 Marionette TRACE conn4 -> [0,212,"getWindowHandle",null]
14:13:19 INFO - PROCESS | 2300 | 1478643199814 Marionette TRACE conn4 <- [1,212,null,{"value":"13"}]
14:13:19 INFO - TEST-START | /XMLHttpRequest/getresponseheader-cookies-and-more.htm
14:13:19 INFO - PROCESS | 2300 | 1478643199818 Marionette TRACE conn4 -> [0,213,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:19 INFO - PROCESS | 2300 | 1478643199908 Marionette TRACE conn4 <- [1,213,null,{"value":null}]
14:13:19 INFO - PROCESS | 2300 | 1478643199913 Marionette TRACE conn4 -> [0,214,"getWindowHandles",null]
14:13:19 INFO - PROCESS | 2300 | 1478643199915 Marionette TRACE conn4 <- [1,214,null,["13"]]
14:13:19 INFO - PROCESS | 2300 | 1478643199919 Marionette TRACE conn4 -> [0,215,"switchToWindow",{"name":"13"}]
14:13:19 INFO - PROCESS | 2300 | 1478643199923 Marionette TRACE conn4 <- [1,215,null,{}]
14:13:19 INFO - PROCESS | 2300 | 1478643199926 Marionette TRACE conn4 -> [0,216,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-cookies-and-more.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:19 INFO - PROCESS | 2300 | ++DOCSHELL 1B120800 == 44 [pid = 2300] [id = 52]
14:13:19 INFO - PROCESS | 2300 | ++DOMWINDOW == 62 (1B122800) [pid = 2300] [serial = 153] [outer = 00000000]
14:13:19 INFO - PROCESS | 2300 | ++DOMWINDOW == 63 (1B1D2800) [pid = 2300] [serial = 154] [outer = 1B122800]
14:13:19 INFO - PROCESS | 2300 | 1478643199986 Marionette DEBUG loaded listener.js
14:13:20 INFO - PROCESS | 2300 | ++DOMWINDOW == 64 (1B1D5000) [pid = 2300] [serial = 155] [outer = 1B122800]
14:13:20 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:20 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:20 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:20 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:20 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:20 INFO - PROCESS | 2300 | [2300] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
14:13:20 INFO - PROCESS | 2300 | 1478643200332 Marionette TRACE conn4 <- [1,216,null,{"value":["/XMLHttpRequest/getresponseheader-cookies-and-more.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() custom/non-existent headers and cookies",0,null,null]]]}]
14:13:20 INFO - .
14:13:20 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-cookies-and-more.htm | took 532ms
14:13:20 INFO - PROCESS | 2300 | 1478643200353 Marionette TRACE conn4 -> [0,217,"getWindowHandle",null]
14:13:20 INFO - PROCESS | 2300 | 1478643200355 Marionette TRACE conn4 <- [1,217,null,{"value":"13"}]
14:13:20 INFO - TEST-START | /XMLHttpRequest/getresponseheader-error-state.htm
14:13:20 INFO - PROCESS | 2300 | 1478643200359 Marionette TRACE conn4 -> [0,218,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:20 INFO - PROCESS | 2300 | 1478643200452 Marionette TRACE conn4 <- [1,218,null,{"value":null}]
14:13:20 INFO - PROCESS | 2300 | 1478643200523 Marionette TRACE conn4 -> [0,219,"getWindowHandles",null]
14:13:20 INFO - PROCESS | 2300 | 1478643200526 Marionette TRACE conn4 <- [1,219,null,["13"]]
14:13:20 INFO - PROCESS | 2300 | 1478643200529 Marionette TRACE conn4 -> [0,220,"switchToWindow",{"name":"13"}]
14:13:20 INFO - PROCESS | 2300 | 1478643200533 Marionette TRACE conn4 <- [1,220,null,{}]
14:13:20 INFO - PROCESS | 2300 | 1478643200536 Marionette TRACE conn4 -> [0,221,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-error-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:20 INFO - PROCESS | 2300 | ++DOCSHELL 1B129400 == 45 [pid = 2300] [id = 53]
14:13:20 INFO - PROCESS | 2300 | ++DOMWINDOW == 65 (1B1D3C00) [pid = 2300] [serial = 156] [outer = 00000000]
14:13:20 INFO - PROCESS | 2300 | ++DOMWINDOW == 66 (1B48AC00) [pid = 2300] [serial = 157] [outer = 1B1D3C00]
14:13:20 INFO - PROCESS | 2300 | 1478643200604 Marionette DEBUG loaded listener.js
14:13:20 INFO - PROCESS | 2300 | ++DOMWINDOW == 67 (1B494000) [pid = 2300] [serial = 158] [outer = 1B1D3C00]
14:13:20 INFO - PROCESS | 2300 | 1478643200882 Marionette TRACE conn4 <- [1,221,null,{"value":["/XMLHttpRequest/getresponseheader-error-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in error state (failing cross-origin test)",0,null,null]]]}]
14:13:20 INFO - .
14:13:20 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-error-state.htm | took 593ms
14:13:20 INFO - PROCESS | 2300 | 1478643200955 Marionette TRACE conn4 -> [0,222,"getWindowHandle",null]
14:13:20 INFO - PROCESS | 2300 | 1478643200957 Marionette TRACE conn4 <- [1,222,null,{"value":"13"}]
14:13:20 INFO - TEST-START | /XMLHttpRequest/getresponseheader-server-date.htm
14:13:20 INFO - PROCESS | 2300 | 1478643200963 Marionette TRACE conn4 -> [0,223,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:21 INFO - PROCESS | 2300 | 1478643201051 Marionette TRACE conn4 <- [1,223,null,{"value":null}]
14:13:21 INFO - PROCESS | 2300 | 1478643201056 Marionette TRACE conn4 -> [0,224,"getWindowHandles",null]
14:13:21 INFO - PROCESS | 2300 | 1478643201058 Marionette TRACE conn4 <- [1,224,null,["13"]]
14:13:21 INFO - PROCESS | 2300 | 1478643201061 Marionette TRACE conn4 -> [0,225,"switchToWindow",{"name":"13"}]
14:13:21 INFO - PROCESS | 2300 | 1478643201065 Marionette TRACE conn4 <- [1,225,null,{}]
14:13:21 INFO - PROCESS | 2300 | 1478643201069 Marionette TRACE conn4 -> [0,226,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-server-date.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:21 INFO - PROCESS | 2300 | ++DOCSHELL 1B6DB000 == 46 [pid = 2300] [id = 54]
14:13:21 INFO - PROCESS | 2300 | ++DOMWINDOW == 68 (1B6DE800) [pid = 2300] [serial = 159] [outer = 00000000]
14:13:21 INFO - PROCESS | 2300 | ++DOMWINDOW == 69 (1BD27000) [pid = 2300] [serial = 160] [outer = 1B6DE800]
14:13:21 INFO - PROCESS | 2300 | 1478643201129 Marionette DEBUG loaded listener.js
14:13:21 INFO - PROCESS | 2300 | ++DOMWINDOW == 70 (1BD2A000) [pid = 2300] [serial = 161] [outer = 1B6DE800]
14:13:21 INFO - PROCESS | 2300 | 1478643201478 Marionette TRACE conn4 <- [1,226,null,{"value":["/XMLHttpRequest/getresponseheader-server-date.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() server and date",0,null,null]]]}]
14:13:21 INFO - .
14:13:21 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-server-date.htm | took 531ms
14:13:21 INFO - PROCESS | 2300 | 1478643201496 Marionette TRACE conn4 -> [0,227,"getWindowHandle",null]
14:13:21 INFO - PROCESS | 2300 | 1478643201498 Marionette TRACE conn4 <- [1,227,null,{"value":"13"}]
14:13:21 INFO - TEST-START | /XMLHttpRequest/getresponseheader-special-characters.htm
14:13:21 INFO - PROCESS | 2300 | 1478643201503 Marionette TRACE conn4 -> [0,228,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:21 INFO - PROCESS | 2300 | 1478643201601 Marionette TRACE conn4 <- [1,228,null,{"value":null}]
14:13:21 INFO - PROCESS | 2300 | 1478643201674 Marionette TRACE conn4 -> [0,229,"getWindowHandles",null]
14:13:21 INFO - PROCESS | 2300 | 1478643201677 Marionette TRACE conn4 <- [1,229,null,["13"]]
14:13:21 INFO - PROCESS | 2300 | 1478643201680 Marionette TRACE conn4 -> [0,230,"switchToWindow",{"name":"13"}]
14:13:21 INFO - PROCESS | 2300 | 1478643201683 Marionette TRACE conn4 <- [1,230,null,{}]
14:13:21 INFO - PROCESS | 2300 | 1478643201687 Marionette TRACE conn4 -> [0,231,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-special-characters.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:21 INFO - PROCESS | 2300 | ++DOCSHELL 1BD31400 == 47 [pid = 2300] [id = 55]
14:13:21 INFO - PROCESS | 2300 | ++DOMWINDOW == 71 (1BD2E800) [pid = 2300] [serial = 162] [outer = 00000000]
14:13:21 INFO - PROCESS | 2300 | ++DOMWINDOW == 72 (1BEA4400) [pid = 2300] [serial = 163] [outer = 1BD2E800]
14:13:21 INFO - PROCESS | 2300 | 1478643201749 Marionette DEBUG loaded listener.js
14:13:21 INFO - PROCESS | 2300 | ++DOMWINDOW == 73 (1BEA6800) [pid = 2300] [serial = 164] [outer = 1BD2E800]
14:13:22 INFO - PROCESS | 2300 | 1478643202030 Marionette TRACE conn4 <- [1,231,null,{"value":["/XMLHttpRequest/getresponseheader-special-characters.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() funny characters",0,null,null]]]}]
14:13:22 INFO - .
14:13:22 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-special-characters.htm | took 594ms
14:13:22 INFO - PROCESS | 2300 | 1478643202099 Marionette TRACE conn4 -> [0,232,"getWindowHandle",null]
14:13:22 INFO - PROCESS | 2300 | 1478643202101 Marionette TRACE conn4 <- [1,232,null,{"value":"13"}]
14:13:22 INFO - TEST-START | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm
14:13:22 INFO - PROCESS | 2300 | 1478643202105 Marionette TRACE conn4 -> [0,233,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:22 INFO - PROCESS | 2300 | 1478643202242 Marionette TRACE conn4 <- [1,233,null,{"value":null}]
14:13:22 INFO - PROCESS | 2300 | 1478643202250 Marionette TRACE conn4 -> [0,234,"getWindowHandles",null]
14:13:22 INFO - PROCESS | 2300 | 1478643202252 Marionette TRACE conn4 <- [1,234,null,["13"]]
14:13:22 INFO - PROCESS | 2300 | 1478643202255 Marionette TRACE conn4 -> [0,235,"switchToWindow",{"name":"13"}]
14:13:22 INFO - PROCESS | 2300 | 1478643202259 Marionette TRACE conn4 <- [1,235,null,{}]
14:13:22 INFO - PROCESS | 2300 | 1478643202262 Marionette TRACE conn4 -> [0,236,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:22 INFO - PROCESS | 2300 | ++DOCSHELL 0F063400 == 48 [pid = 2300] [id = 56]
14:13:22 INFO - PROCESS | 2300 | ++DOMWINDOW == 74 (0F0DD000) [pid = 2300] [serial = 165] [outer = 00000000]
14:13:22 INFO - PROCESS | 2300 | ++DOMWINDOW == 75 (12E0A400) [pid = 2300] [serial = 166] [outer = 0F0DD000]
14:13:22 INFO - PROCESS | 2300 | 1478643202371 Marionette DEBUG loaded listener.js
14:13:22 INFO - PROCESS | 2300 | ++DOMWINDOW == 76 (13E0F000) [pid = 2300] [serial = 167] [outer = 0F0DD000]
14:13:22 INFO - PROCESS | 2300 | 1478643202856 Marionette TRACE conn4 <- [1,236,null,{"value":["/XMLHttpRequest/getresponseheader-unsent-opened-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in unsent, opened states",0,null,null]]]}]
14:13:22 INFO - .
14:13:22 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm | took 781ms
14:13:22 INFO - PROCESS | 2300 | 1478643202886 Marionette TRACE conn4 -> [0,237,"getWindowHandle",null]
14:13:22 INFO - PROCESS | 2300 | 1478643202891 Marionette TRACE conn4 <- [1,237,null,{"value":"13"}]
14:13:22 INFO - TEST-START | /XMLHttpRequest/headers-normalize-response.htm
14:13:22 INFO - PROCESS | 2300 | 1478643202899 Marionette TRACE conn4 -> [0,238,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:23 INFO - PROCESS | 2300 | 1478643203061 Marionette TRACE conn4 <- [1,238,null,{"value":null}]
14:13:23 INFO - PROCESS | 2300 | 1478643203175 Marionette TRACE conn4 -> [0,239,"getWindowHandles",null]
14:13:23 INFO - PROCESS | 2300 | 1478643203180 Marionette TRACE conn4 <- [1,239,null,["13"]]
14:13:23 INFO - PROCESS | 2300 | 1478643203188 Marionette TRACE conn4 -> [0,240,"switchToWindow",{"name":"13"}]
14:13:23 INFO - PROCESS | 2300 | 1478643203193 Marionette TRACE conn4 <- [1,240,null,{}]
14:13:23 INFO - PROCESS | 2300 | 1478643203198 Marionette TRACE conn4 -> [0,241,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/headers-normalize-response.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:23 INFO - PROCESS | 2300 | ++DOCSHELL 166E6400 == 49 [pid = 2300] [id = 57]
14:13:23 INFO - PROCESS | 2300 | ++DOMWINDOW == 77 (16AB2000) [pid = 2300] [serial = 168] [outer = 00000000]
14:13:23 INFO - PROCESS | 2300 | ++DOMWINDOW == 78 (16E4F000) [pid = 2300] [serial = 169] [outer = 16AB2000]
14:13:23 INFO - PROCESS | 2300 | 1478643203279 Marionette DEBUG loaded listener.js
14:13:23 INFO - PROCESS | 2300 | ++DOMWINDOW == 79 (18190000) [pid = 2300] [serial = 170] [outer = 16AB2000]
14:13:23 INFO - PROCESS | 2300 | 1478643203841 Marionette TRACE conn4 <- [1,241,null,{"value":["/XMLHttpRequest/headers-normalize-response.htm",0,null,null,[["Header value: hello_world\\0",0,null,null],["Header value: \\0hello_world",0,null,null],["Header value: hello\\0world",0,null,null],["Header value: __hello_world",0,null,null],["Header value: hello_world__",0,null,null],["Header value: __hello_world__",0,null,null],["Header value: [tab]hello_world",0,null,null],["Header value: hello_world[tab]",0,null,null],["Header value: [tab]hello_world[tab]",0,null,null],["Header value: hello______world",0,null,null],["Header value: hello[tab]world",0,null,null],["Header value: \\0",0,null,null],["Header value: ___",0,null,null],["Header value: [tab]",0,null,null],["Header value: ",0,null,null]]]}]
14:13:23 INFO - ...............
14:13:23 INFO - TEST-OK | /XMLHttpRequest/headers-normalize-response.htm | took 984ms
14:13:23 INFO - PROCESS | 2300 | 1478643203885 Marionette TRACE conn4 -> [0,242,"getWindowHandle",null]
14:13:23 INFO - PROCESS | 2300 | 1478643203888 Marionette TRACE conn4 <- [1,242,null,{"value":"13"}]
14:13:23 INFO - TEST-START | /XMLHttpRequest/interfaces.html
14:13:23 INFO - PROCESS | 2300 | 1478643203894 Marionette TRACE conn4 -> [0,243,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:24 INFO - PROCESS | 2300 | 1478643204018 Marionette TRACE conn4 <- [1,243,null,{"value":null}]
14:13:24 INFO - PROCESS | 2300 | 1478643204104 Marionette TRACE conn4 -> [0,244,"getWindowHandles",null]
14:13:24 INFO - PROCESS | 2300 | 1478643204107 Marionette TRACE conn4 <- [1,244,null,["13"]]
14:13:24 INFO - PROCESS | 2300 | 1478643204111 Marionette TRACE conn4 -> [0,245,"switchToWindow",{"name":"13"}]
14:13:24 INFO - PROCESS | 2300 | 1478643204116 Marionette TRACE conn4 <- [1,245,null,{}]
14:13:24 INFO - PROCESS | 2300 | 1478643204120 Marionette TRACE conn4 -> [0,246,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/interfaces.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/interfaces.html\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:24 INFO - PROCESS | 2300 | ++DOCSHELL 196E0400 == 50 [pid = 2300] [id = 58]
14:13:24 INFO - PROCESS | 2300 | ++DOMWINDOW == 80 (19850800) [pid = 2300] [serial = 171] [outer = 00000000]
14:13:24 INFO - PROCESS | 2300 | ++DOMWINDOW == 81 (1A365C00) [pid = 2300] [serial = 172] [outer = 19850800]
14:13:24 INFO - PROCESS | 2300 | 1478643204196 Marionette DEBUG loaded listener.js
14:13:24 INFO - PROCESS | 2300 | ++DOMWINDOW == 82 (1B026400) [pid = 2300] [serial = 173] [outer = 19850800]
14:13:24 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
14:13:24 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
14:13:24 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
14:13:25 INFO - PROCESS | 2300 | 1478643205392 Marionette TRACE conn4 <- [1,246,null,{"value":["/XMLHttpRequest/interfaces.html",0,null,null,[["XMLHttpRequestEventTarget interface: existence and properties of interface object",0,null,null],["XMLHttpRequestEventTarget interface object length",0,null,null],["XMLHttpRequestEventTarget interface object name",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadstart",0,null,null],["XMLHttpRequestEventTarget interface: attribute onprogress",0,null,null],["XMLHttpRequestEventTarget interface: attribute onabort",0,null,null],["XMLHttpRequestEventTarget interface: attribute onerror",0,null,null],["XMLHttpRequestEventTarget interface: attribute onload",0,null,null],["XMLHttpRequestEventTarget interface: attribute ontimeout",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadend",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface object",0,null,null],["XMLHttpRequestUpload interface object length",0,null,null],["XMLHttpRequestUpload interface object name",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestUpload must be primary interface of (new XMLHttpRequest()).upload",0,null,null],["Stringification of (new XMLHttpRequest()).upload",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: existence and properties of interface object",0,null,null],["XMLHttpRequest interface object length",0,null,null],["XMLHttpRequest interface object name",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequest interface: attribute onreadystatechange",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface object",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface prototype object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface prototype object",0,null,null],["XMLHttpRequest interface: constant DONE on interface object",0,null,null],["XMLHttpRequest interface: constant DONE on interface prototype object",0,null,null],["XMLHttpRequest interface: attribute readyState",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString)",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString,boolean,USVString,USVString)",0,null,null],["XMLHttpRequest interface: operation setRequestHeader(ByteString,ByteString)",0,null,null],["XMLHttpRequest interface: attribute timeout",0,null,null],["XMLHttpRequest interface: attribute withCredentials",0,null,null],["XMLHttpRequest interface: attribute upload",0,null,null],["XMLHttpRequest interface: operation send([object Object],[object Object])",0,null,null],["XMLHttpRequest interface: operation abort()",0,null,null],["XMLHttpRequest interface: attribute responseURL",0,null,null],["XMLHttpRequest interface: attribute status",0,null,null],["XMLHttpRequest interface: attribute statusText",0,null,null],["XMLHttpRequest interface: operation getResponseHeader(ByteString)",0,null,null],["XMLHttpRequest interface: operation getAllResponseHeaders()",0,null,null],["XMLHttpRequest interface: operation overrideMimeType(DOMString)",0,null,null],["XMLHttpRequest interface: attribute responseType",0,null,null],["XMLHttpRequest interface: attribute response",0,null,null],["XMLHttpRequest interface: attribute responseText",0,null,null],["XMLHttpRequest interface: attribute responseXML",0,null,null],["XMLHttpRequest must be primary interface of new XMLHttpRequest()",0,null,null],["Stringification of new XMLHttpRequest()",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"onreadystatechange\" with the proper type (0)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"UNSENT\" with the proper type (1)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"OPENED\" with the proper type (2)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"HEADERS_RECEIVED\" with the proper type (3)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"LOADING\" with the proper type (4)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"DONE\" with the proper type (5)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"readyState\" with the proper type (6)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (7)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (8)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString,boolean,USVString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"setRequestHeader\" with the proper type (9)",0,null,null],["XMLHttpRequest interface: calling setRequestHeader(ByteString,ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"timeout\" with the proper type (10)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"withCredentials\" with the proper type (11)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"upload\" with the proper type (12)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"send\" with the proper type (13)",0,null,null],["XMLHttpRequest interface: calling send([object Object],[object Object]) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"abort\" with the proper type (14)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseURL\" with the proper type (15)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"status\" with the proper type (16)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"statusText\" with the proper type (17)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getResponseHeader\" with the proper type (18)",0,null,null],["XMLHttpRequest interface: calling getResponseHeader(ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getAllResponseHeaders\" with the proper type (19)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"overrideMimeType\" with the proper type (20)",0,null,null],["XMLHttpRequest interface: calling overrideMimeType(DOMString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseType\" with the proper type (21)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"response\" with the proper type (22)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseText\" with the proper type (23)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseXML\" with the proper type (24)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["FormData interface: existence and properties of interface object",0,null,null],["FormData interface object length",0,null,null],["FormData interface object name",0,null,null],["FormData interface: existence and properties of interface prototype object",0,null,null],["FormData interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["FormData interface: operation append(USVString,Blob,USVString)",0,null,null],["FormData interface: operation append(USVString,USVString)",0,null,null],["FormData interface: operation delete(USVString)",0,null,null],["FormData interface: operation get(USVString)",0,null,null],["FormData interface: operation getAll(USVString)",0,null,null],["FormData interface: operation has(USVString)",0,null,null],["FormData interface: operation set(USVString,Blob,USVString)",0,null,null],["FormData interface: operation set(USVString,USVString)",0,null,null],["FormData must be primary interface of new FormData()",0,null,null],["Stringification of new FormData()",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData must be primary interface of new FormData(form)",0,null,null],["Stringification of new FormData(form)",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["ProgressEvent interface: existence and properties of interface object",0,null,null],["ProgressEvent interface object length",0,null,null],["ProgressEvent interface object name",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["ProgressEvent interface: attribute lengthComputable",0,null,null],["ProgressEvent interface: attribute loaded",0,null,null],["ProgressEvent interface: attribute total",0,null,null]]]}]
14:13:25 INFO - ..........................................................................................................................................................................
14:13:25 INFO - TEST-OK | /XMLHttpRequest/interfaces.html | took 1656ms
14:13:25 INFO - PROCESS | 2300 | 1478643205562 Marionette TRACE conn4 -> [0,247,"getWindowHandle",null]
14:13:25 INFO - PROCESS | 2300 | 1478643205568 Marionette TRACE conn4 <- [1,247,null,{"value":"13"}]
14:13:25 INFO - TEST-START | /XMLHttpRequest/open-after-abort.htm
14:13:25 INFO - PROCESS | 2300 | 1478643205577 Marionette TRACE conn4 -> [0,248,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:25 INFO - PROCESS | 2300 | 1478643205697 Marionette TRACE conn4 <- [1,248,null,{"value":null}]
14:13:25 INFO - PROCESS | 2300 | 1478643205786 Marionette TRACE conn4 -> [0,249,"getWindowHandles",null]
14:13:25 INFO - PROCESS | 2300 | 1478643205789 Marionette TRACE conn4 <- [1,249,null,["13"]]
14:13:25 INFO - PROCESS | 2300 | 1478643205793 Marionette TRACE conn4 -> [0,250,"switchToWindow",{"name":"13"}]
14:13:25 INFO - PROCESS | 2300 | 1478643205799 Marionette TRACE conn4 <- [1,250,null,{}]
14:13:25 INFO - PROCESS | 2300 | 1478643205802 Marionette TRACE conn4 -> [0,251,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:25 INFO - PROCESS | 2300 | ++DOCSHELL 18C1F400 == 51 [pid = 2300] [id = 59]
14:13:25 INFO - PROCESS | 2300 | ++DOMWINDOW == 83 (18C1FC00) [pid = 2300] [serial = 174] [outer = 00000000]
14:13:25 INFO - PROCESS | 2300 | ++DOMWINDOW == 84 (1ACBE800) [pid = 2300] [serial = 175] [outer = 18C1FC00]
14:13:25 INFO - PROCESS | 2300 | 1478643205881 Marionette DEBUG loaded listener.js
14:13:25 INFO - PROCESS | 2300 | ++DOMWINDOW == 85 (1ACC1800) [pid = 2300] [serial = 176] [outer = 18C1FC00]
14:13:26 INFO - PROCESS | 2300 | 1478643206283 Marionette TRACE conn4 <- [1,251,null,{"value":["/XMLHttpRequest/open-after-abort.htm",0,null,null,[["XMLHttpRequest: open() after abort()",0,null,null]]]}]
14:13:26 INFO - .
14:13:26 INFO - TEST-OK | /XMLHttpRequest/open-after-abort.htm | took 750ms
14:13:26 INFO - PROCESS | 2300 | 1478643206317 Marionette TRACE conn4 -> [0,252,"getWindowHandle",null]
14:13:26 INFO - PROCESS | 2300 | 1478643206320 Marionette TRACE conn4 <- [1,252,null,{"value":"13"}]
14:13:26 INFO - TEST-START | /XMLHttpRequest/open-after-setrequestheader.htm
14:13:26 INFO - PROCESS | 2300 | 1478643206325 Marionette TRACE conn4 -> [0,253,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:26 INFO - PROCESS | 2300 | 1478643206442 Marionette TRACE conn4 <- [1,253,null,{"value":null}]
14:13:26 INFO - PROCESS | 2300 | 1478643206516 Marionette TRACE conn4 -> [0,254,"getWindowHandles",null]
14:13:26 INFO - PROCESS | 2300 | 1478643206519 Marionette TRACE conn4 <- [1,254,null,["13"]]
14:13:26 INFO - PROCESS | 2300 | 1478643206548 Marionette TRACE conn4 -> [0,255,"switchToWindow",{"name":"13"}]
14:13:26 INFO - PROCESS | 2300 | 1478643206553 Marionette TRACE conn4 <- [1,255,null,{}]
14:13:26 INFO - PROCESS | 2300 | 1478643206557 Marionette TRACE conn4 -> [0,256,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-setrequestheader.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:26 INFO - PROCESS | 2300 | ++DOCSHELL 1ACC4400 == 52 [pid = 2300] [id = 60]
14:13:26 INFO - PROCESS | 2300 | ++DOMWINDOW == 86 (1ACC5400) [pid = 2300] [serial = 177] [outer = 00000000]
14:13:26 INFO - PROCESS | 2300 | ++DOMWINDOW == 87 (1B12C000) [pid = 2300] [serial = 178] [outer = 1ACC5400]
14:13:26 INFO - PROCESS | 2300 | 1478643206632 Marionette DEBUG loaded listener.js
14:13:26 INFO - PROCESS | 2300 | ++DOMWINDOW == 88 (1B1D9400) [pid = 2300] [serial = 179] [outer = 1ACC5400]
14:13:27 INFO - PROCESS | 2300 | 1478643207239 Marionette TRACE conn4 <- [1,256,null,{"value":["/XMLHttpRequest/open-after-setrequestheader.htm",0,null,null,[["XMLHttpRequest: open() after setRequestHeader()",0,null,null]]]}]
14:13:27 INFO - .
14:13:27 INFO - TEST-OK | /XMLHttpRequest/open-after-setrequestheader.htm | took 937ms
14:13:27 INFO - PROCESS | 2300 | 1478643207268 Marionette TRACE conn4 -> [0,257,"getWindowHandle",null]
14:13:27 INFO - PROCESS | 2300 | 1478643207273 Marionette TRACE conn4 <- [1,257,null,{"value":"13"}]
14:13:27 INFO - TEST-START | /XMLHttpRequest/open-during-abort.htm
14:13:27 INFO - PROCESS | 2300 | 1478643207282 Marionette TRACE conn4 -> [0,258,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:27 INFO - PROCESS | 2300 | 1478643207401 Marionette TRACE conn4 <- [1,258,null,{"value":null}]
14:13:27 INFO - PROCESS | 2300 | 1478643207477 Marionette TRACE conn4 -> [0,259,"getWindowHandles",null]
14:13:27 INFO - PROCESS | 2300 | 1478643207481 Marionette TRACE conn4 <- [1,259,null,["13"]]
14:13:27 INFO - PROCESS | 2300 | 1478643207536 Marionette TRACE conn4 -> [0,260,"switchToWindow",{"name":"13"}]
14:13:27 INFO - PROCESS | 2300 | 1478643207543 Marionette TRACE conn4 <- [1,260,null,{}]
14:13:27 INFO - PROCESS | 2300 | 1478643207550 Marionette TRACE conn4 -> [0,261,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-during-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:27 INFO - PROCESS | 2300 | ++DOCSHELL 0FBE8C00 == 53 [pid = 2300] [id = 61]
14:13:27 INFO - PROCESS | 2300 | ++DOMWINDOW == 89 (0FBEE000) [pid = 2300] [serial = 180] [outer = 00000000]
14:13:27 INFO - PROCESS | 2300 | ++DOMWINDOW == 90 (14185C00) [pid = 2300] [serial = 181] [outer = 0FBEE000]
14:13:27 INFO - PROCESS | 2300 | 1478643207623 Marionette DEBUG loaded listener.js
14:13:27 INFO - PROCESS | 2300 | ++DOMWINDOW == 91 (1522B000) [pid = 2300] [serial = 182] [outer = 0FBEE000]
14:13:28 INFO - PROCESS | 2300 | 1478643208044 Marionette TRACE conn4 <- [1,261,null,{"value":["/XMLHttpRequest/open-during-abort.htm",0,null,null,[["XMLHttpRequest: open() during abort()",0,null,null]]]}]
14:13:28 INFO - .
14:13:28 INFO - TEST-OK | /XMLHttpRequest/open-during-abort.htm | took 781ms
14:13:28 INFO - PROCESS | 2300 | 1478643208060 Marionette TRACE conn4 -> [0,262,"getWindowHandle",null]
14:13:28 INFO - TEST-START | /XMLHttpRequest/open-method-bogus.htm
14:13:28 INFO - PROCESS | 2300 | 1478643208063 Marionette TRACE conn4 <- [1,262,null,{"value":"13"}]
14:13:28 INFO - PROCESS | 2300 | 1478643208069 Marionette TRACE conn4 -> [0,263,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:28 INFO - PROCESS | 2300 | 1478643208182 Marionette TRACE conn4 <- [1,263,null,{"value":null}]
14:13:28 INFO - PROCESS | 2300 | 1478643208257 Marionette TRACE conn4 -> [0,264,"getWindowHandles",null]
14:13:28 INFO - PROCESS | 2300 | 1478643208260 Marionette TRACE conn4 <- [1,264,null,["13"]]
14:13:28 INFO - PROCESS | 2300 | 1478643208264 Marionette TRACE conn4 -> [0,265,"switchToWindow",{"name":"13"}]
14:13:28 INFO - PROCESS | 2300 | 1478643208268 Marionette TRACE conn4 <- [1,265,null,{}]
14:13:28 INFO - PROCESS | 2300 | 1478643208319 Marionette TRACE conn4 -> [0,266,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:28 INFO - PROCESS | 2300 | ++DOCSHELL 16AAC800 == 54 [pid = 2300] [id = 62]
14:13:28 INFO - PROCESS | 2300 | ++DOMWINDOW == 92 (16C1AC00) [pid = 2300] [serial = 183] [outer = 00000000]
14:13:28 INFO - PROCESS | 2300 | ++DOMWINDOW == 93 (1819C000) [pid = 2300] [serial = 184] [outer = 16C1AC00]
14:13:28 INFO - PROCESS | 2300 | 1478643208385 Marionette DEBUG loaded listener.js
14:13:28 INFO - PROCESS | 2300 | ++DOMWINDOW == 94 (189BF000) [pid = 2300] [serial = 185] [outer = 16C1AC00]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 1BD31400 == 53 [pid = 2300] [id = 55]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 1B6DB000 == 52 [pid = 2300] [id = 54]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 1B129400 == 51 [pid = 2300] [id = 53]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 1B120800 == 50 [pid = 2300] [id = 52]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 130D1400 == 49 [pid = 2300] [id = 51]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 1ADA8C00 == 48 [pid = 2300] [id = 50]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 193D0400 == 47 [pid = 2300] [id = 49]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 1863A400 == 46 [pid = 2300] [id = 48]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 15366000 == 45 [pid = 2300] [id = 47]
14:13:28 INFO - PROCESS | 2300 | --DOCSHELL 13E76000 == 44 [pid = 2300] [id = 46]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 93 (17720000) [pid = 2300] [serial = 115] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 92 (17F39400) [pid = 2300] [serial = 116] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 91 (153D2400) [pid = 2300] [serial = 112] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 90 (158BBC00) [pid = 2300] [serial = 113] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 89 (145D3800) [pid = 2300] [serial = 109] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 88 (147EB400) [pid = 2300] [serial = 110] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | --DOMWINDOW == 87 (19269000) [pid = 2300] [serial = 118] [outer = 00000000] [url = about:blank]
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:28 INFO - PROCESS | 2300 | 1478643208817 Marionette TRACE conn4 <- [1,266,null,{"value":["/XMLHttpRequest/open-method-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus methods ()",0,null,null],["XMLHttpRequest: open() - bogus methods (>)",0,null,null],["XMLHttpRequest: open() - bogus methods ( GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G T)",0,null,null],["XMLHttpRequest: open() - bogus methods (@GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G:ET)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET?)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET\n)",0,null,null]]]}]
14:13:28 INFO - ........
14:13:28 INFO - TEST-OK | /XMLHttpRequest/open-method-bogus.htm | took 797ms
14:13:28 INFO - PROCESS | 2300 | 1478643208874 Marionette TRACE conn4 -> [0,267,"getWindowHandle",null]
14:13:28 INFO - PROCESS | 2300 | 1478643208879 Marionette TRACE conn4 <- [1,267,null,{"value":"13"}]
14:13:28 INFO - TEST-START | /XMLHttpRequest/open-method-case-insensitive.htm
14:13:28 INFO - PROCESS | 2300 | 1478643208883 Marionette TRACE conn4 -> [0,268,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:28 INFO - PROCESS | 2300 | 1478643208986 Marionette TRACE conn4 <- [1,268,null,{"value":null}]
14:13:29 INFO - PROCESS | 2300 | 1478643208995 Marionette TRACE conn4 -> [0,269,"getWindowHandles",null]
14:13:29 INFO - PROCESS | 2300 | 1478643208998 Marionette TRACE conn4 <- [1,269,null,["13"]]
14:13:29 INFO - PROCESS | 2300 | 1478643209001 Marionette TRACE conn4 -> [0,270,"switchToWindow",{"name":"13"}]
14:13:29 INFO - PROCESS | 2300 | 1478643209006 Marionette TRACE conn4 <- [1,270,null,{}]
14:13:29 INFO - PROCESS | 2300 | 1478643209012 Marionette TRACE conn4 -> [0,271,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:29 INFO - PROCESS | 2300 | ++DOCSHELL 1819B800 == 45 [pid = 2300] [id = 63]
14:13:29 INFO - PROCESS | 2300 | ++DOMWINDOW == 88 (1819BC00) [pid = 2300] [serial = 186] [outer = 00000000]
14:13:29 INFO - PROCESS | 2300 | ++DOMWINDOW == 89 (18F16400) [pid = 2300] [serial = 187] [outer = 1819BC00]
14:13:29 INFO - PROCESS | 2300 | 1478643209143 Marionette DEBUG loaded listener.js
14:13:29 INFO - PROCESS | 2300 | ++DOMWINDOW == 90 (1925DC00) [pid = 2300] [serial = 188] [outer = 1819BC00]
14:13:29 INFO - PROCESS | 2300 | 1478643209502 Marionette TRACE conn4 <- [1,271,null,{"value":["/XMLHttpRequest/open-method-case-insensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-insensitive methods test (DELETE)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (GET)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (HEAD)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (OPTIONS)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (POST)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (PUT)",0,null,null]]]}]
14:13:29 INFO - ......
14:13:29 INFO - TEST-OK | /XMLHttpRequest/open-method-case-insensitive.htm | took 641ms
14:13:29 INFO - PROCESS | 2300 | 1478643209523 Marionette TRACE conn4 -> [0,272,"getWindowHandle",null]
14:13:29 INFO - PROCESS | 2300 | 1478643209526 Marionette TRACE conn4 <- [1,272,null,{"value":"13"}]
14:13:29 INFO - TEST-START | /XMLHttpRequest/open-method-case-sensitive.htm
14:13:29 INFO - PROCESS | 2300 | 1478643209531 Marionette TRACE conn4 -> [0,273,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:29 INFO - PROCESS | 2300 | 1478643209635 Marionette TRACE conn4 <- [1,273,null,{"value":null}]
14:13:29 INFO - PROCESS | 2300 | 1478643209709 Marionette TRACE conn4 -> [0,274,"getWindowHandles",null]
14:13:29 INFO - PROCESS | 2300 | 1478643209712 Marionette TRACE conn4 <- [1,274,null,["13"]]
14:13:29 INFO - PROCESS | 2300 | 1478643209715 Marionette TRACE conn4 -> [0,275,"switchToWindow",{"name":"13"}]
14:13:29 INFO - PROCESS | 2300 | 1478643209720 Marionette TRACE conn4 <- [1,275,null,{}]
14:13:29 INFO - PROCESS | 2300 | 1478643209726 Marionette TRACE conn4 -> [0,276,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-sensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:29 INFO - PROCESS | 2300 | ++DOCSHELL 19A64C00 == 46 [pid = 2300] [id = 64]
14:13:29 INFO - PROCESS | 2300 | ++DOMWINDOW == 91 (19A68C00) [pid = 2300] [serial = 189] [outer = 00000000]
14:13:29 INFO - PROCESS | 2300 | ++DOMWINDOW == 92 (1ACC4000) [pid = 2300] [serial = 190] [outer = 19A68C00]
14:13:29 INFO - PROCESS | 2300 | 1478643209826 Marionette DEBUG loaded listener.js
14:13:29 INFO - PROCESS | 2300 | ++DOMWINDOW == 93 (1AD0D000) [pid = 2300] [serial = 191] [outer = 19A68C00]
14:13:30 INFO - PROCESS | 2300 | 1478643210198 Marionette TRACE conn4 <- [1,276,null,{"value":["/XMLHttpRequest/open-method-case-sensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-sensitive methods test (XUNICORN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (xUNIcorn)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (chiCKEN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (PATCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (patCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (copy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (COpy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (inDEX)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (movE)",0,null,null]]]}]
14:13:30 INFO - .........
14:13:30 INFO - TEST-OK | /XMLHttpRequest/open-method-case-sensitive.htm | took 703ms
14:13:30 INFO - PROCESS | 2300 | 1478643210228 Marionette TRACE conn4 -> [0,277,"getWindowHandle",null]
14:13:30 INFO - PROCESS | 2300 | 1478643210231 Marionette TRACE conn4 <- [1,277,null,{"value":"13"}]
14:13:30 INFO - TEST-START | /XMLHttpRequest/open-method-insecure.htm
14:13:30 INFO - PROCESS | 2300 | 1478643210235 Marionette TRACE conn4 -> [0,278,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:30 INFO - PROCESS | 2300 | 1478643210328 Marionette TRACE conn4 <- [1,278,null,{"value":null}]
14:13:30 INFO - PROCESS | 2300 | 1478643210333 Marionette TRACE conn4 -> [0,279,"getWindowHandles",null]
14:13:30 INFO - PROCESS | 2300 | 1478643210335 Marionette TRACE conn4 <- [1,279,null,["13"]]
14:13:30 INFO - PROCESS | 2300 | 1478643210339 Marionette TRACE conn4 -> [0,280,"switchToWindow",{"name":"13"}]
14:13:30 INFO - PROCESS | 2300 | 1478643210343 Marionette TRACE conn4 <- [1,280,null,{}]
14:13:30 INFO - PROCESS | 2300 | 1478643210348 Marionette TRACE conn4 -> [0,281,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-insecure.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:30 INFO - PROCESS | 2300 | ++DOCSHELL 1ADB3C00 == 47 [pid = 2300] [id = 65]
14:13:30 INFO - PROCESS | 2300 | ++DOMWINDOW == 94 (1ADB4800) [pid = 2300] [serial = 192] [outer = 00000000]
14:13:30 INFO - PROCESS | 2300 | ++DOMWINDOW == 95 (1B11F400) [pid = 2300] [serial = 193] [outer = 1ADB4800]
14:13:30 INFO - PROCESS | 2300 | 1478643210410 Marionette DEBUG loaded listener.js
14:13:30 INFO - PROCESS | 2300 | ++DOMWINDOW == 96 (1B129400) [pid = 2300] [serial = 194] [outer = 1ADB4800]
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | [2300] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
14:13:30 INFO - PROCESS | 2300 | 1478643210802 Marionette TRACE conn4 <- [1,281,null,{"value":["/XMLHttpRequest/open-method-insecure.htm",0,null,null,[["XMLHttpRequest: open() - \"insecure\" methods (track)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACK)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trAck)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trace)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (traCE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connect)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (CONNECT)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connECT)",0,null,null]]]}]
14:13:30 INFO - .........
14:13:30 INFO - TEST-OK | /XMLHttpRequest/open-method-insecure.htm | took 609ms
14:13:30 INFO - PROCESS | 2300 | 1478643210832 Marionette TRACE conn4 -> [0,282,"getWindowHandle",null]
14:13:30 INFO - PROCESS | 2300 | 1478643210834 Marionette TRACE conn4 <- [1,282,null,{"value":"13"}]
14:13:30 INFO - TEST-START | /XMLHttpRequest/open-method-responsetype-set-sync.htm
14:13:30 INFO - PROCESS | 2300 | 1478643210839 Marionette TRACE conn4 -> [0,283,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:30 INFO - PROCESS | 2300 | 1478643210991 Marionette TRACE conn4 <- [1,283,null,{"value":null}]
14:13:31 INFO - PROCESS | 2300 | 1478643211004 Marionette TRACE conn4 -> [0,284,"getWindowHandles",null]
14:13:31 INFO - PROCESS | 2300 | 1478643211007 Marionette TRACE conn4 <- [1,284,null,["13"]]
14:13:31 INFO - PROCESS | 2300 | 1478643211011 Marionette TRACE conn4 -> [0,285,"switchToWindow",{"name":"13"}]
14:13:31 INFO - PROCESS | 2300 | 1478643211015 Marionette TRACE conn4 <- [1,285,null,{}]
14:13:31 INFO - PROCESS | 2300 | 1478643211018 Marionette TRACE conn4 -> [0,286,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-responsetype-set-sync.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:31 INFO - PROCESS | 2300 | ++DOCSHELL 13057C00 == 48 [pid = 2300] [id = 66]
14:13:31 INFO - PROCESS | 2300 | ++DOMWINDOW == 97 (1369E400) [pid = 2300] [serial = 195] [outer = 00000000]
14:13:31 INFO - PROCESS | 2300 | ++DOMWINDOW == 98 (1BD2F800) [pid = 2300] [serial = 196] [outer = 1369E400]
14:13:31 INFO - PROCESS | 2300 | 1478643211082 Marionette DEBUG loaded listener.js
14:13:31 INFO - PROCESS | 2300 | ++DOMWINDOW == 99 (1BEB0400) [pid = 2300] [serial = 197] [outer = 1369E400]
14:13:31 INFO - PROCESS | 2300 | 1478643211485 Marionette TRACE conn4 <- [1,286,null,{"value":["/XMLHttpRequest/open-method-responsetype-set-sync.htm",0,null,null,[["XMLHttpRequest: open() sync request not allowed if responseType is set (arraybuffer)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (blob)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (json)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (text)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (document)",0,null,null]]]}]
14:13:31 INFO - .....
14:13:31 INFO - TEST-OK | /XMLHttpRequest/open-method-responsetype-set-sync.htm | took 672ms
14:13:31 INFO - PROCESS | 2300 | 1478643211520 Marionette TRACE conn4 -> [0,287,"getWindowHandle",null]
14:13:31 INFO - PROCESS | 2300 | 1478643211522 Marionette TRACE conn4 <- [1,287,null,{"value":"13"}]
14:13:31 INFO - TEST-START | /XMLHttpRequest/open-open-send.htm
14:13:31 INFO - PROCESS | 2300 | 1478643211527 Marionette TRACE conn4 -> [0,288,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:31 INFO - PROCESS | 2300 | 1478643211649 Marionette TRACE conn4 <- [1,288,null,{"value":null}]
14:13:31 INFO - PROCESS | 2300 | 1478643211654 Marionette TRACE conn4 -> [0,289,"getWindowHandles",null]
14:13:31 INFO - PROCESS | 2300 | 1478643211657 Marionette TRACE conn4 <- [1,289,null,["13"]]
14:13:31 INFO - PROCESS | 2300 | 1478643211661 Marionette TRACE conn4 -> [0,290,"switchToWindow",{"name":"13"}]
14:13:31 INFO - PROCESS | 2300 | 1478643211665 Marionette TRACE conn4 <- [1,290,null,{}]
14:13:31 INFO - PROCESS | 2300 | 1478643211712 Marionette TRACE conn4 -> [0,291,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:31 INFO - PROCESS | 2300 | ++DOCSHELL 158B2000 == 49 [pid = 2300] [id = 67]
14:13:31 INFO - PROCESS | 2300 | ++DOMWINDOW == 100 (158B2400) [pid = 2300] [serial = 198] [outer = 00000000]
14:13:31 INFO - PROCESS | 2300 | ++DOMWINDOW == 101 (1BEA9400) [pid = 2300] [serial = 199] [outer = 158B2400]
14:13:31 INFO - PROCESS | 2300 | 1478643211781 Marionette DEBUG loaded listener.js
14:13:31 INFO - PROCESS | 2300 | ++DOMWINDOW == 102 (1BEB1400) [pid = 2300] [serial = 200] [outer = 158B2400]
14:13:32 INFO - PROCESS | 2300 | 1478643212122 Marionette TRACE conn4 <- [1,291,null,{"value":["/XMLHttpRequest/open-open-send.htm",0,null,null,[["XMLHttpRequest: open() - open() - send()",0,null,null]]]}]
14:13:32 INFO - .
14:13:32 INFO - TEST-OK | /XMLHttpRequest/open-open-send.htm | took 641ms
14:13:32 INFO - PROCESS | 2300 | 1478643212165 Marionette TRACE conn4 -> [0,292,"getWindowHandle",null]
14:13:32 INFO - PROCESS | 2300 | 1478643212167 Marionette TRACE conn4 <- [1,292,null,{"value":"13"}]
14:13:32 INFO - TEST-START | /XMLHttpRequest/open-open-sync-send.htm
14:13:32 INFO - PROCESS | 2300 | 1478643212171 Marionette TRACE conn4 -> [0,293,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:32 INFO - PROCESS | 2300 | 1478643212292 Marionette TRACE conn4 <- [1,293,null,{"value":null}]
14:13:32 INFO - PROCESS | 2300 | 1478643212297 Marionette TRACE conn4 -> [0,294,"getWindowHandles",null]
14:13:32 INFO - PROCESS | 2300 | 1478643212300 Marionette TRACE conn4 <- [1,294,null,["13"]]
14:13:32 INFO - PROCESS | 2300 | 1478643212303 Marionette TRACE conn4 -> [0,295,"switchToWindow",{"name":"13"}]
14:13:32 INFO - PROCESS | 2300 | 1478643212306 Marionette TRACE conn4 <- [1,295,null,{}]
14:13:32 INFO - PROCESS | 2300 | 1478643212359 Marionette TRACE conn4 -> [0,296,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-sync-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-sync-send.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:32 INFO - PROCESS | 2300 | ++DOCSHELL 1882AC00 == 50 [pid = 2300] [id = 68]
14:13:32 INFO - PROCESS | 2300 | ++DOMWINDOW == 103 (1882C800) [pid = 2300] [serial = 201] [outer = 00000000]
14:13:32 INFO - PROCESS | 2300 | ++DOMWINDOW == 104 (18834800) [pid = 2300] [serial = 202] [outer = 1882C800]
14:13:32 INFO - PROCESS | 2300 | 1478643212419 Marionette DEBUG loaded listener.js
14:13:32 INFO - PROCESS | 2300 | ++DOMWINDOW == 105 (18836800) [pid = 2300] [serial = 203] [outer = 1882C800]
14:13:32 INFO - PROCESS | 2300 | 1478643212752 Marionette TRACE conn4 <- [1,296,null,{"value":["/XMLHttpRequest/open-open-sync-send.htm",0,null,null,[["XMLHttpRequest: open() - open() (sync) - send()",0,null,null]]]}]
14:13:32 INFO - .
14:13:32 INFO - TEST-OK | /XMLHttpRequest/open-open-sync-send.htm | took 640ms
14:13:32 INFO - PROCESS | 2300 | 1478643212809 Marionette TRACE conn4 -> [0,297,"getWindowHandle",null]
14:13:32 INFO - PROCESS | 2300 | 1478643212811 Marionette TRACE conn4 <- [1,297,null,{"value":"13"}]
14:13:32 INFO - TEST-START | /XMLHttpRequest/open-referer.htm
14:13:32 INFO - PROCESS | 2300 | 1478643212816 Marionette TRACE conn4 -> [0,298,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:32 INFO - PROCESS | 2300 | 1478643212939 Marionette TRACE conn4 <- [1,298,null,{"value":null}]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 104 (1B1D3C00) [pid = 2300] [serial = 156] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 103 (1ADA9000) [pid = 2300] [serial = 147] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 102 (1B122800) [pid = 2300] [serial = 153] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 101 (153D5400) [pid = 2300] [serial = 138] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 100 (189BD000) [pid = 2300] [serial = 141] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 99 (196F0C00) [pid = 2300] [serial = 126] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 98 (1B6DE800) [pid = 2300] [serial = 159] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 97 (158C2400) [pid = 2300] [serial = 123] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 96 (1417C800) [pid = 2300] [serial = 120] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 95 (13E77C00) [pid = 2300] [serial = 135] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 94 (1A36E400) [pid = 2300] [serial = 129] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 93 (0F27F000) [pid = 2300] [serial = 132] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 92 (145CD800) [pid = 2300] [serial = 150] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 91 (1A0F1000) [pid = 2300] [serial = 144] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm]
14:13:33 INFO - PROCESS | 2300 | --DOMWINDOW == 90 (1ADB2800) [pid = 2300] [serial = 105] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm]
14:13:33 INFO - PROCESS | 2300 | 1478643213283 Marionette TRACE conn4 -> [0,299,"getWindowHandles",null]
14:13:33 INFO - PROCESS | 2300 | 1478643213285 Marionette TRACE conn4 <- [1,299,null,["13"]]
14:13:33 INFO - PROCESS | 2300 | 1478643213290 Marionette TRACE conn4 -> [0,300,"switchToWindow",{"name":"13"}]
14:13:33 INFO - PROCESS | 2300 | 1478643213295 Marionette TRACE conn4 <- [1,300,null,{}]
14:13:33 INFO - PROCESS | 2300 | 1478643213302 Marionette TRACE conn4 -> [0,301,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-referer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-referer.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:33 INFO - PROCESS | 2300 | ++DOCSHELL 0FC13C00 == 51 [pid = 2300] [id = 69]
14:13:33 INFO - PROCESS | 2300 | ++DOMWINDOW == 91 (0FC14000) [pid = 2300] [serial = 204] [outer = 00000000]
14:13:33 INFO - PROCESS | 2300 | ++DOMWINDOW == 92 (0FC1EC00) [pid = 2300] [serial = 205] [outer = 0FC14000]
14:13:33 INFO - PROCESS | 2300 | 1478643213363 Marionette DEBUG loaded listener.js
14:13:33 INFO - PROCESS | 2300 | ++DOMWINDOW == 93 (12E06C00) [pid = 2300] [serial = 206] [outer = 0FC14000]
14:13:33 INFO - PROCESS | 2300 | 1478643213650 Marionette TRACE conn4 <- [1,301,null,{"value":["/XMLHttpRequest/open-referer.htm",0,null,null,[["XMLHttpRequest: open() - value of Referer header",0,null,null]]]}]
14:13:33 INFO - .
14:13:33 INFO - TEST-OK | /XMLHttpRequest/open-referer.htm | took 875ms
14:13:33 INFO - PROCESS | 2300 | 1478643213698 Marionette TRACE conn4 -> [0,302,"getWindowHandle",null]
14:13:33 INFO - PROCESS | 2300 | 1478643213700 Marionette TRACE conn4 <- [1,302,null,{"value":"13"}]
14:13:33 INFO - TEST-START | /XMLHttpRequest/open-send-open.htm
14:13:33 INFO - PROCESS | 2300 | 1478643213705 Marionette TRACE conn4 -> [0,303,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:33 INFO - PROCESS | 2300 | 1478643213797 Marionette TRACE conn4 <- [1,303,null,{"value":null}]
14:13:33 INFO - PROCESS | 2300 | 1478643213803 Marionette TRACE conn4 -> [0,304,"getWindowHandles",null]
14:13:33 INFO - PROCESS | 2300 | 1478643213807 Marionette TRACE conn4 <- [1,304,null,["13"]]
14:13:33 INFO - PROCESS | 2300 | 1478643213812 Marionette TRACE conn4 -> [0,305,"switchToWindow",{"name":"13"}]
14:13:33 INFO - PROCESS | 2300 | 1478643213815 Marionette TRACE conn4 <- [1,305,null,{}]
14:13:33 INFO - PROCESS | 2300 | 1478643213820 Marionette TRACE conn4 -> [0,306,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-send-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-send-open.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:33 INFO - PROCESS | 2300 | ++DOCSHELL 1818FC00 == 52 [pid = 2300] [id = 70]
14:13:33 INFO - PROCESS | 2300 | ++DOMWINDOW == 94 (1882DC00) [pid = 2300] [serial = 207] [outer = 00000000]
14:13:33 INFO - PROCESS | 2300 | ++DOMWINDOW == 95 (196F0C00) [pid = 2300] [serial = 208] [outer = 1882DC00]
14:13:33 INFO - PROCESS | 2300 | 1478643213882 Marionette DEBUG loaded listener.js
14:13:33 INFO - PROCESS | 2300 | ++DOMWINDOW == 96 (1AF80000) [pid = 2300] [serial = 209] [outer = 1882DC00]
14:13:34 INFO - PROCESS | 2300 | 1478643214232 Marionette TRACE conn4 <- [1,306,null,{"value":["/XMLHttpRequest/open-send-open.htm",0,null,null,[["XMLHttpRequest: open() - send() - open()",0,null,null]]]}]
14:13:34 INFO - .
14:13:34 INFO - TEST-OK | /XMLHttpRequest/open-send-open.htm | took 594ms
14:13:34 INFO - PROCESS | 2300 | 1478643214301 Marionette TRACE conn4 -> [0,307,"getWindowHandle",null]
14:13:34 INFO - PROCESS | 2300 | 1478643214303 Marionette TRACE conn4 <- [1,307,null,{"value":"13"}]
14:13:34 INFO - TEST-START | /XMLHttpRequest/open-sync-open-send.htm
14:13:34 INFO - PROCESS | 2300 | 1478643214307 Marionette TRACE conn4 -> [0,308,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:34 INFO - PROCESS | 2300 | 1478643214448 Marionette TRACE conn4 <- [1,308,null,{"value":null}]
14:13:34 INFO - PROCESS | 2300 | 1478643214455 Marionette TRACE conn4 -> [0,309,"getWindowHandles",null]
14:13:34 INFO - PROCESS | 2300 | 1478643214457 Marionette TRACE conn4 <- [1,309,null,["13"]]
14:13:34 INFO - PROCESS | 2300 | 1478643214461 Marionette TRACE conn4 -> [0,310,"switchToWindow",{"name":"13"}]
14:13:34 INFO - PROCESS | 2300 | 1478643214465 Marionette TRACE conn4 <- [1,310,null,{}]
14:13:34 INFO - PROCESS | 2300 | 1478643214469 Marionette TRACE conn4 -> [0,311,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-sync-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-sync-open-send.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:34 INFO - PROCESS | 2300 | ++DOCSHELL 198E6000 == 53 [pid = 2300] [id = 71]
14:13:34 INFO - PROCESS | 2300 | ++DOMWINDOW == 97 (198E6400) [pid = 2300] [serial = 210] [outer = 00000000]
14:13:34 INFO - PROCESS | 2300 | ++DOMWINDOW == 98 (198ED800) [pid = 2300] [serial = 211] [outer = 198E6400]
14:13:34 INFO - PROCESS | 2300 | 1478643214532 Marionette DEBUG loaded listener.js
14:13:34 INFO - PROCESS | 2300 | ++DOMWINDOW == 99 (1BEAA000) [pid = 2300] [serial = 212] [outer = 198E6400]
14:13:34 INFO - PROCESS | 2300 | 1478643214881 Marionette TRACE conn4 <- [1,311,null,{"value":["/XMLHttpRequest/open-sync-open-send.htm",0,null,null,[["XMLHttpRequest: open() (sync) - send() - open()",0,null,null]]]}]
14:13:34 INFO - .
14:13:34 INFO - TEST-OK | /XMLHttpRequest/open-sync-open-send.htm | took 641ms
14:13:34 INFO - PROCESS | 2300 | 1478643214944 Marionette TRACE conn4 -> [0,312,"getWindowHandle",null]
14:13:34 INFO - PROCESS | 2300 | 1478643214946 Marionette TRACE conn4 <- [1,312,null,{"value":"13"}]
14:13:34 INFO - TEST-START | /XMLHttpRequest/open-url-about-blank-window.htm
14:13:34 INFO - PROCESS | 2300 | 1478643214950 Marionette TRACE conn4 -> [0,313,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:35 INFO - PROCESS | 2300 | 1478643215042 Marionette TRACE conn4 <- [1,313,null,{"value":null}]
14:13:35 INFO - PROCESS | 2300 | 1478643215048 Marionette TRACE conn4 -> [0,314,"getWindowHandles",null]
14:13:35 INFO - PROCESS | 2300 | 1478643215050 Marionette TRACE conn4 <- [1,314,null,["13"]]
14:13:35 INFO - PROCESS | 2300 | 1478643215053 Marionette TRACE conn4 -> [0,315,"switchToWindow",{"name":"13"}]
14:13:35 INFO - PROCESS | 2300 | 1478643215056 Marionette TRACE conn4 <- [1,315,null,{}]
14:13:35 INFO - PROCESS | 2300 | 1478643215059 Marionette TRACE conn4 -> [0,316,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-about-blank-window.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-about-blank-window.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:35 INFO - PROCESS | 2300 | ++DOCSHELL 1BF01800 == 54 [pid = 2300] [id = 72]
14:13:35 INFO - PROCESS | 2300 | ++DOMWINDOW == 100 (1BF02000) [pid = 2300] [serial = 213] [outer = 00000000]
14:13:35 INFO - PROCESS | 2300 | ++DOMWINDOW == 101 (1BF0A000) [pid = 2300] [serial = 214] [outer = 1BF02000]
14:13:35 INFO - PROCESS | 2300 | 1478643215120 Marionette DEBUG loaded listener.js
14:13:35 INFO - PROCESS | 2300 | ++DOMWINDOW == 102 (1BF0D800) [pid = 2300] [serial = 215] [outer = 1BF02000]
14:13:35 INFO - PROCESS | 2300 | ++DOCSHELL 13052000 == 55 [pid = 2300] [id = 73]
14:13:35 INFO - PROCESS | 2300 | ++DOMWINDOW == 103 (1369FC00) [pid = 2300] [serial = 216] [outer = 00000000]
14:13:35 INFO - PROCESS | 2300 | ++DOMWINDOW == 104 (0FC16400) [pid = 2300] [serial = 217] [outer = 1369FC00]
14:13:35 INFO - PROCESS | 2300 | 1478643215664 Marionette TRACE conn4 <- [1,316,null,{"value":["/XMLHttpRequest/open-url-about-blank-window.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs (about:blank iframe)",0,null,null]]]}]
14:13:35 INFO - .
14:13:35 INFO - TEST-OK | /XMLHttpRequest/open-url-about-blank-window.htm | took 734ms
14:13:35 INFO - PROCESS | 2300 | 1478643215691 Marionette TRACE conn4 -> [0,317,"getWindowHandle",null]
14:13:35 INFO - PROCESS | 2300 | 1478643215697 Marionette TRACE conn4 <- [1,317,null,{"value":"13"}]
14:13:35 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted-after-open.htm
14:13:35 INFO - PROCESS | 2300 | 1478643215704 Marionette TRACE conn4 -> [0,318,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:35 INFO - PROCESS | 2300 | 1478643215907 Marionette TRACE conn4 <- [1,318,null,{"value":null}]
14:13:36 INFO - PROCESS | 2300 | 1478643216034 Marionette TRACE conn4 -> [0,319,"getWindowHandles",null]
14:13:36 INFO - PROCESS | 2300 | 1478643216039 Marionette TRACE conn4 <- [1,319,null,["13"]]
14:13:36 INFO - PROCESS | 2300 | 1478643216045 Marionette TRACE conn4 -> [0,320,"switchToWindow",{"name":"13"}]
14:13:36 INFO - PROCESS | 2300 | 1478643216050 Marionette TRACE conn4 <- [1,320,null,{}]
14:13:36 INFO - PROCESS | 2300 | 1478643216055 Marionette TRACE conn4 -> [0,321,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted-after-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted-after-open.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:36 INFO - PROCESS | 2300 | ++DOCSHELL 147EBC00 == 56 [pid = 2300] [id = 74]
14:13:36 INFO - PROCESS | 2300 | ++DOMWINDOW == 105 (1522B800) [pid = 2300] [serial = 218] [outer = 00000000]
14:13:36 INFO - PROCESS | 2300 | ++DOMWINDOW == 106 (158B7000) [pid = 2300] [serial = 219] [outer = 1522B800]
14:13:36 INFO - PROCESS | 2300 | 1478643216140 Marionette DEBUG loaded listener.js
14:13:36 INFO - PROCESS | 2300 | ++DOMWINDOW == 107 (16685400) [pid = 2300] [serial = 220] [outer = 1522B800]
14:13:36 INFO - PROCESS | 2300 | 1478643216560 Marionette TRACE conn4 <- [1,321,null,{"value":["/XMLHttpRequest/open-url-base-inserted-after-open.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert after open()",0,null,null]]]}]
14:13:36 INFO - .
14:13:36 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted-after-open.htm | took 891ms
14:13:36 INFO - PROCESS | 2300 | 1478643216586 Marionette TRACE conn4 -> [0,322,"getWindowHandle",null]
14:13:36 INFO - PROCESS | 2300 | 1478643216589 Marionette TRACE conn4 <- [1,322,null,{"value":"13"}]
14:13:36 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted.htm
14:13:36 INFO - PROCESS | 2300 | 1478643216595 Marionette TRACE conn4 -> [0,323,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:36 INFO - PROCESS | 2300 | 1478643216722 Marionette TRACE conn4 <- [1,323,null,{"value":null}]
14:13:36 INFO - PROCESS | 2300 | 1478643216845 Marionette TRACE conn4 -> [0,324,"getWindowHandles",null]
14:13:36 INFO - PROCESS | 2300 | 1478643216849 Marionette TRACE conn4 <- [1,324,null,["13"]]
14:13:36 INFO - PROCESS | 2300 | 1478643216856 Marionette TRACE conn4 -> [0,325,"switchToWindow",{"name":"13"}]
14:13:36 INFO - PROCESS | 2300 | 1478643216864 Marionette TRACE conn4 <- [1,325,null,{}]
14:13:36 INFO - PROCESS | 2300 | 1478643216871 Marionette TRACE conn4 -> [0,326,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:36 INFO - PROCESS | 2300 | ++DOCSHELL 16AB9800 == 57 [pid = 2300] [id = 75]
14:13:36 INFO - PROCESS | 2300 | ++DOMWINDOW == 108 (16C87C00) [pid = 2300] [serial = 221] [outer = 00000000]
14:13:36 INFO - PROCESS | 2300 | ++DOMWINDOW == 109 (16D4B800) [pid = 2300] [serial = 222] [outer = 16C87C00]
14:13:36 INFO - PROCESS | 2300 | 1478643216949 Marionette DEBUG loaded listener.js
14:13:37 INFO - PROCESS | 2300 | ++DOMWINDOW == 110 (16D4F000) [pid = 2300] [serial = 223] [outer = 16C87C00]
14:13:37 INFO - PROCESS | 2300 | 1478643217371 Marionette TRACE conn4 <- [1,326,null,{"value":["/XMLHttpRequest/open-url-base-inserted.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert ",0,null,null]]]}]
14:13:37 INFO - .
14:13:37 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted.htm | took 828ms
14:13:37 INFO - PROCESS | 2300 | 1478643217445 Marionette TRACE conn4 -> [0,327,"getWindowHandle",null]
14:13:37 INFO - PROCESS | 2300 | 1478643217451 Marionette TRACE conn4 <- [1,327,null,{"value":"13"}]
14:13:37 INFO - TEST-START | /XMLHttpRequest/open-url-base.htm
14:13:37 INFO - PROCESS | 2300 | 1478643217497 Marionette TRACE conn4 -> [0,328,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:37 INFO - PROCESS | 2300 | 1478643217608 Marionette TRACE conn4 <- [1,328,null,{"value":null}]
14:13:37 INFO - PROCESS | 2300 | 1478643217731 Marionette TRACE conn4 -> [0,329,"getWindowHandles",null]
14:13:37 INFO - PROCESS | 2300 | 1478643217735 Marionette TRACE conn4 <- [1,329,null,["13"]]
14:13:37 INFO - PROCESS | 2300 | 1478643217738 Marionette TRACE conn4 -> [0,330,"switchToWindow",{"name":"13"}]
14:13:37 INFO - PROCESS | 2300 | 1478643217744 Marionette TRACE conn4 <- [1,330,null,{}]
14:13:37 INFO - PROCESS | 2300 | 1478643217748 Marionette TRACE conn4 -> [0,331,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:37 INFO - PROCESS | 2300 | ++DOCSHELL 1818F800 == 58 [pid = 2300] [id = 76]
14:13:37 INFO - PROCESS | 2300 | ++DOMWINDOW == 111 (18192400) [pid = 2300] [serial = 224] [outer = 00000000]
14:13:37 INFO - PROCESS | 2300 | ++DOMWINDOW == 112 (189BD800) [pid = 2300] [serial = 225] [outer = 18192400]
14:13:37 INFO - PROCESS | 2300 | 1478643217870 Marionette DEBUG loaded listener.js
14:13:37 INFO - PROCESS | 2300 | ++DOMWINDOW == 113 (18C1D000) [pid = 2300] [serial = 226] [outer = 18192400]
14:13:38 INFO - PROCESS | 2300 | 1478643218290 Marionette TRACE conn4 <- [1,331,null,{"value":["/XMLHttpRequest/open-url-base.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - ",0,null,null]]]}]
14:13:38 INFO - .
14:13:38 INFO - TEST-OK | /XMLHttpRequest/open-url-base.htm | took 875ms
14:13:38 INFO - PROCESS | 2300 | 1478643218339 Marionette TRACE conn4 -> [0,332,"getWindowHandle",null]
14:13:38 INFO - PROCESS | 2300 | 1478643218342 Marionette TRACE conn4 <- [1,332,null,{"value":"13"}]
14:13:38 INFO - TEST-START | /XMLHttpRequest/open-url-bogus.htm
14:13:38 INFO - PROCESS | 2300 | 1478643218347 Marionette TRACE conn4 -> [0,333,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:38 INFO - PROCESS | 2300 | 1478643218469 Marionette TRACE conn4 <- [1,333,null,{"value":null}]
14:13:38 INFO - PROCESS | 2300 | 1478643218594 Marionette TRACE conn4 -> [0,334,"getWindowHandles",null]
14:13:38 INFO - PROCESS | 2300 | 1478643218597 Marionette TRACE conn4 <- [1,334,null,["13"]]
14:13:38 INFO - PROCESS | 2300 | 1478643218602 Marionette TRACE conn4 -> [0,335,"switchToWindow",{"name":"13"}]
14:13:38 INFO - PROCESS | 2300 | 1478643218606 Marionette TRACE conn4 <- [1,335,null,{}]
14:13:38 INFO - PROCESS | 2300 | 1478643218612 Marionette TRACE conn4 -> [0,336,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:38 INFO - PROCESS | 2300 | ++DOCSHELL 198E8400 == 59 [pid = 2300] [id = 77]
14:13:38 INFO - PROCESS | 2300 | ++DOMWINDOW == 114 (198E8800) [pid = 2300] [serial = 227] [outer = 00000000]
14:13:38 INFO - PROCESS | 2300 | ++DOMWINDOW == 115 (19A62800) [pid = 2300] [serial = 228] [outer = 198E8800]
14:13:38 INFO - PROCESS | 2300 | 1478643218690 Marionette DEBUG loaded listener.js
14:13:38 INFO - PROCESS | 2300 | ++DOMWINDOW == 116 (1ACBBC00) [pid = 2300] [serial = 229] [outer = 198E8800]
14:13:39 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsIOService.cpp, line 779
14:13:39 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:\builds\moz2_slave\autoland-w32-d-000000000000000\build\src\netwerk\base\nsNetUtilInlines.h, line 180
14:13:39 INFO - PROCESS | 2300 | [2300] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 2495
14:13:39 INFO - PROCESS | 2300 | 1478643219124 Marionette TRACE conn4 <- [1,336,null,{"value":["/XMLHttpRequest/open-url-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus URLs (//[)",0,null,null],["XMLHttpRequest: open() - bogus URLs (ftp:)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:19:7\n"],["XMLHttpRequest: open() - bogus URLs (http://a a/)",0,null,null],["XMLHttpRequest: open() - bogus URLs (http:////////////)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:21:7\n"],["XMLHttpRequest: open() - bogus URLs (http://u:p@/)",0,null,null]]]}]
14:13:39 INFO - .....
14:13:39 INFO - TEST-OK | /XMLHttpRequest/open-url-bogus.htm | took 828ms
14:13:39 INFO - PROCESS | 2300 | 1478643219188 Marionette TRACE conn4 -> [0,337,"getWindowHandle",null]
14:13:39 INFO - PROCESS | 2300 | 1478643219191 Marionette TRACE conn4 <- [1,337,null,{"value":"13"}]
14:13:39 INFO - TEST-START | /XMLHttpRequest/open-url-encoding.htm
14:13:39 INFO - PROCESS | 2300 | 1478643219195 Marionette TRACE conn4 -> [0,338,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:39 INFO - PROCESS | 2300 | 1478643219322 Marionette TRACE conn4 <- [1,338,null,{"value":null}]
14:13:39 INFO - PROCESS | 2300 | 1478643219464 Marionette TRACE conn4 -> [0,339,"getWindowHandles",null]
14:13:39 INFO - PROCESS | 2300 | 1478643219467 Marionette TRACE conn4 <- [1,339,null,["13"]]
14:13:39 INFO - PROCESS | 2300 | 1478643219474 Marionette TRACE conn4 -> [0,340,"switchToWindow",{"name":"13"}]
14:13:39 INFO - PROCESS | 2300 | 1478643219478 Marionette TRACE conn4 <- [1,340,null,{}]
14:13:39 INFO - PROCESS | 2300 | 1478643219482 Marionette TRACE conn4 -> [0,341,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-encoding.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-encoding.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:39 INFO - PROCESS | 2300 | ++DOCSHELL 198EC400 == 60 [pid = 2300] [id = 78]
14:13:39 INFO - PROCESS | 2300 | ++DOMWINDOW == 117 (198ED000) [pid = 2300] [serial = 230] [outer = 00000000]
14:13:39 INFO - PROCESS | 2300 | ++DOMWINDOW == 118 (1B1DA000) [pid = 2300] [serial = 231] [outer = 198ED000]
14:13:39 INFO - PROCESS | 2300 | 1478643219557 Marionette DEBUG loaded listener.js
14:13:39 INFO - PROCESS | 2300 | ++DOMWINDOW == 119 (1B6E2000) [pid = 2300] [serial = 232] [outer = 198ED000]
14:13:39 INFO - PROCESS | 2300 | [2300] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\autoland-w32-d-000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 594
14:13:39 INFO - PROCESS | 2300 | [2300] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\autoland-w32-d-000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 495
14:13:39 INFO - PROCESS | 2300 | 1478643219977 Marionette TRACE conn4 <- [1,341,null,{"value":["/XMLHttpRequest/open-url-encoding.htm",0,null,null,[["percent encode characters",0,null,null],["lone surrogate should return U+FFFD",0,null,null]]]}]
14:13:40 INFO - ..
14:13:40 INFO - TEST-OK | /XMLHttpRequest/open-url-encoding.htm | took 844ms
14:13:40 INFO - PROCESS | 2300 | 1478643220036 Marionette TRACE conn4 -> [0,342,"getWindowHandle",null]
14:13:40 INFO - PROCESS | 2300 | 1478643220039 Marionette TRACE conn4 <- [1,342,null,{"value":"13"}]
14:13:40 INFO - TEST-START | /XMLHttpRequest/open-url-fragment.htm
14:13:40 INFO - PROCESS | 2300 | 1478643220044 Marionette TRACE conn4 -> [0,343,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:40 INFO - PROCESS | 2300 | 1478643220218 Marionette TRACE conn4 <- [1,343,null,{"value":null}]
14:13:40 INFO - PROCESS | 2300 | 1478643220482 Marionette TRACE conn4 -> [0,344,"getWindowHandles",null]
14:13:40 INFO - PROCESS | 2300 | 1478643220487 Marionette TRACE conn4 <- [1,344,null,["13"]]
14:13:40 INFO - PROCESS | 2300 | 1478643220505 Marionette TRACE conn4 -> [0,345,"switchToWindow",{"name":"13"}]
14:13:40 INFO - PROCESS | 2300 | 1478643220513 Marionette TRACE conn4 <- [1,345,null,{}]
14:13:40 INFO - PROCESS | 2300 | 1478643220518 Marionette TRACE conn4 -> [0,346,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-fragment.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-fragment.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:40 INFO - PROCESS | 2300 | ++DOCSHELL 1431CC00 == 61 [pid = 2300] [id = 79]
14:13:40 INFO - PROCESS | 2300 | ++DOMWINDOW == 120 (143D8800) [pid = 2300] [serial = 233] [outer = 00000000]
14:13:40 INFO - PROCESS | 2300 | ++DOMWINDOW == 121 (149B9400) [pid = 2300] [serial = 234] [outer = 143D8800]
14:13:40 INFO - PROCESS | 2300 | 1478643220590 Marionette DEBUG loaded listener.js
14:13:40 INFO - PROCESS | 2300 | ++DOMWINDOW == 122 (158AE800) [pid = 2300] [serial = 235] [outer = 143D8800]
14:13:41 INFO - PROCESS | 2300 | 1478643221057 Marionette TRACE conn4 <- [1,346,null,{"value":["/XMLHttpRequest/open-url-fragment.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - fragment identifier",0,null,null],["make sure fragment is removed from URL before request",0,null,null],["make sure fragment is removed from URL before request (with query string)",0,null,null],["make sure escaped # is not removed",0,null,null]]]}]
14:13:41 INFO - ....
14:13:41 INFO - TEST-OK | /XMLHttpRequest/open-url-fragment.htm | took 1031ms
14:13:41 INFO - PROCESS | 2300 | 1478643221077 Marionette TRACE conn4 -> [0,347,"getWindowHandle",null]
14:13:41 INFO - PROCESS | 2300 | 1478643221082 Marionette TRACE conn4 <- [1,347,null,{"value":"13"}]
14:13:41 INFO - TEST-START | /XMLHttpRequest/open-url-javascript-window-2.htm
14:13:41 INFO - PROCESS | 2300 | 1478643221088 Marionette TRACE conn4 -> [0,348,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
14:13:41 INFO - PROCESS | 2300 | 1478643221211 Marionette TRACE conn4 <- [1,348,null,{"value":null}]
14:13:41 INFO - PROCESS | 2300 | 1478643221346 Marionette TRACE conn4 -> [0,349,"getWindowHandles",null]
14:13:41 INFO - PROCESS | 2300 | 1478643221350 Marionette TRACE conn4 <- [1,349,null,["13"]]
14:13:41 INFO - PROCESS | 2300 | 1478643221359 Marionette TRACE conn4 -> [0,350,"switchToWindow",{"name":"13"}]
14:13:41 INFO - PROCESS | 2300 | 1478643221364 Marionette TRACE conn4 <- [1,350,null,{}]
14:13:41 INFO - PROCESS | 2300 | 1478643221368 Marionette TRACE conn4 -> [0,351,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-javascript-window-2.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-javascript-window-2.htm\", \"ea7f55db-fb6d-4e8e-bb43-1c84e400555d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
14:13:41 INFO - PROCESS | 2300 | ++DOCSHELL 14933800 == 62 [pid = 2300] [id = 80]
14:13:41 INFO - PROCESS | 2300 | ++DOMWINDOW == 123 (14935000) [pid = 2300] [serial = 236] [outer = 00000000]
14:13:41 INFO - PROCESS | 2300 | ++DOMWINDOW == 124 (158B3C00) [pid = 2300] [serial = 237] [outer = 14935000]
14:13:41 INFO - PROCESS | 2300 | 1478643221435 Marionette DEBUG loaded listener.js
14:13:41 INFO - PROCESS | 2300 | ++DOMWINDOW == 125 (16686C00) [pid = 2300] [serial = 238] [outer = 14935000]
14:13:41 INFO - PROCESS | 2300 | ++DOCSHELL 13060800 == 63 [pid = 2300] [id = 81]
14:13:41 INFO - PROCESS | 2300 | ++DOMWINDOW == 126 (158ADC00) [pid = 2300] [serial = 239] [outer = 00000000]
14:13:41 INFO - PROCESS | 2300 | ++DOMWINDOW == 127 (1668BC00) [pid = 2300] [serial = 240] [outer = 158ADC00]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 198E6000 == 62 [pid = 2300] [id = 71]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1818FC00 == 61 [pid = 2300] [id = 70]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1882AC00 == 60 [pid = 2300] [id = 68]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 0FC13C00 == 59 [pid = 2300] [id = 69]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 13057C00 == 58 [pid = 2300] [id = 66]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 158B2000 == 57 [pid = 2300] [id = 67]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1ADB3C00 == 56 [pid = 2300] [id = 65]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1819B800 == 55 [pid = 2300] [id = 63]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 19A64C00 == 54 [pid = 2300] [id = 64]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 0FBE8C00 == 53 [pid = 2300] [id = 61]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 16AAC800 == 52 [pid = 2300] [id = 62]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 166E6400 == 51 [pid = 2300] [id = 57]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 196E0400 == 50 [pid = 2300] [id = 58]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 0F063400 == 49 [pid = 2300] [id = 56]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 18930000 == 48 [pid = 2300] [id = 33]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 19937C00 == 47 [pid = 2300] [id = 35]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 0F27E400 == 46 [pid = 2300] [id = 45]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 153DD000 == 45 [pid = 2300] [id = 42]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 196EA400 == 44 [pid = 2300] [id = 34]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 166D8C00 == 43 [pid = 2300] [id = 40]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 196F0800 == 42 [pid = 2300] [id = 43]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 196D1400 == 41 [pid = 2300] [id = 36]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 13697400 == 40 [pid = 2300] [id = 41]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 145D3C00 == 39 [pid = 2300] [id = 32]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 18C1F400 == 38 [pid = 2300] [id = 59]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1ACC4400 == 37 [pid = 2300] [id = 60]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1A36E000 == 36 [pid = 2300] [id = 44]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 198EC400 == 35 [pid = 2300] [id = 78]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1431CC00 == 34 [pid = 2300] [id = 79]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 13052000 == 33 [pid = 2300] [id = 73]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1BF01800 == 32 [pid = 2300] [id = 72]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 147EBC00 == 31 [pid = 2300] [id = 74]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 16AB9800 == 30 [pid = 2300] [id = 75]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 1818F800 == 29 [pid = 2300] [id = 76]
14:13:42 INFO - PROCESS | 2300 | --DOCSHELL 198E8400 == 28 [pid = 2300] [id = 77]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 126 (149B8800) [pid = 2300] [serial = 122] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 125 (14753000) [pid = 2300] [serial = 121] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 124 (1771D400) [pid = 2300] [serial = 125] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 123 (16C8DC00) [pid = 2300] [serial = 124] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 122 (1A0EC000) [pid = 2300] [serial = 128] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 121 (19A62400) [pid = 2300] [serial = 127] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 120 (1ADAC800) [pid = 2300] [serial = 131] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 119 (1AD14C00) [pid = 2300] [serial = 130] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 118 (16AB3400) [pid = 2300] [serial = 134] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 117 (143D5000) [pid = 2300] [serial = 133] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 116 (145D1C00) [pid = 2300] [serial = 137] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 115 (14183C00) [pid = 2300] [serial = 136] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 114 (17F3A800) [pid = 2300] [serial = 140] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 113 (16E4EC00) [pid = 2300] [serial = 139] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 112 (198C4800) [pid = 2300] [serial = 143] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 111 (196D4000) [pid = 2300] [serial = 142] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 110 (1AD16400) [pid = 2300] [serial = 146] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 109 (1A370C00) [pid = 2300] [serial = 145] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 108 (1ADB5800) [pid = 2300] [serial = 149] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 107 (1AF80800) [pid = 2300] [serial = 148] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 106 (1B030400) [pid = 2300] [serial = 152] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 105 (1ADB1C00) [pid = 2300] [serial = 151] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 104 (1B1D5000) [pid = 2300] [serial = 155] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 103 (1B1D2800) [pid = 2300] [serial = 154] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 102 (1B494000) [pid = 2300] [serial = 158] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 101 (1B48AC00) [pid = 2300] [serial = 157] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 100 (1BD2A000) [pid = 2300] [serial = 161] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 99 (1BD27000) [pid = 2300] [serial = 160] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 98 (1BEA4400) [pid = 2300] [serial = 163] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | --DOMWINDOW == 97 (1B02AC00) [pid = 2300] [serial = 107] [outer = 00000000] [url = about:blank]
14:13:42 INFO - PROCESS | 2300 | 1478643222809 Marionette TRACE conn4 <- [1,351,null,{"value":["/XMLHttpRequest/open-url-javascript-window-2.htm",0,null,null,[["XMLHttpRequest: open() - resolving URLs (javascript: